Welcome to the Tenable Network Security Podcast - Episode 73
Hosts: Paul Asadoorian, Product Evangelist, Carlos Perez, Lead Vulnerability Researcher and Ron Gula, Tenable CEO/CTO
Announcements
Several new blog posts have been published this week, including:
Agentless FDCC, USGCB and CyberScope Reporting Webinar - March 23 2:00 PM EST
Event Analysis: Detecting Compromises, Javascript, Backdoors, and more!
The Nessus Port Scanning Engine: An Inside Look
Check out our video channel on YouTube that contains the latest Nessus and SecurityCenter 4 tutorials.
We're hiring! - Visit the Tenable web site for more information about open positions.
You can subscribe to the Tenable Network Security Podcast on iTunes!
Tenable Tweets - You can find us on Twitter at http://twitter.com/tenablesecurity where we make various announcements, provide Nessus plugin statistics and more!
Stories
Outbound SSH Traffic from HP Blade Servers - In this case it appears to be a bug, but what if it wasn't? I believe we need to keep close tabs on network connections in our environment. I'm a huge fan of Netflow analysis, largely because if you are attacking anything on the network, you need to make a connection. It's a difficult thing to get around (provided you do not have physical access to a medium that is not being monitored, such as 3G or some other wireless protocol). Also, it raises a scary situation where devices are pre-owned, meaning that during the manufacturing process attackers placed backdoors on the systems. Network monitoring can help identify these channels. For example, you should be able to spot your networking gear's management interfaces attempting to make connections out to the Internet.