Tenable
Follow
1480 Followers
Follow Tenable on their other social channels!
About Us
Founded:
2002
Company Size:
501-1000 employees
Company Type:
Private
Location:
Columbia, MD
Website:
Tenable Network Security transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces ...
Read more
Promoted Content
Try Tenable.io™ Free for 60 Days!
Follow
1128
Capture the Flag with Mr. Robot
The hacker-favorite TV show, Mr. Robot, is back on with a great season three opener that features a Capture-the-Flag contest. As the show begins, Elliot decides he needs to stop stage 2 from taking place. Needing a computer to close the backdoor he left in Season 2, Darlene and Elliot travel to the hackerspace in an attempt to find Internet access. At the hacker space, Elliot talks to a contestant that proclaims he was a CyberPatriot finalist. Elliot and the contestant discu ...
Follow
331
Responding to KRACK: What You Need To Know
A new weakness in WPA2 protocol could allow an attacker to read information that was previously assumed to be encrypted, provided the attacker is within the range of the victim. The weakness was discovered by researchers Mathy Vanhoef and Frank Piessens, from the University of Leuven and has been dubbed KRACK (Key Reinstallation Attack). Which devices are affected by KRACK? The KRACK weakness works against all modern, protected Wi-Fi networks. Therefore, if a device suppor ...
Follow
19
New in SecurityCenter 5.5.2
Multi-LDAP support now availableWe are pleased to announce the release of SecurityCenter® 5.5.2, which will deliver a number of exciting new capabilities. Here are some highlights: Support for Multiple LDAP Servers SecurityCenter 5.5.2 introduces Multi-LDAP support, allowing users to use multiple LDAP servers to authorize SecurityCenter users. This new feature removes operational overhead and administrative challenges associated with authenticating SecurityCenter users, and allows compliance ...
Follow
383
Auditing Databases with Nessus
As a companion to another post on hardening network devices and creating baseline configurations, I wanted to look at another area where standardizing configurations can pay off in a big way. While there is plenty of fertile ground out there, I decided to focus on some specific aspects of databases. As I started reviewing recent research, I noticed a couple of interesting things from the world of finance that likely aren’t radically different from most environments. Findings ...
Follow
41
Personalizing Your Tenable.io Scans
Tenable.io™ Scan and Policy Templates allow you to set up scans with minimal configuration. There are templates for many tasks, such as Host Discovery, detecting the latest headline-grabbing malware, managing mobile devices and more. However, your network is constantly evolving. Eventually the predefined templates will not satisfy the needs of your network. With Tenable.io, you can optimize the management of your network’s cyber risk by designing and launching customized vulnerabilit ...
Follow
221
Maintain Your &%$#* Systems! A Mantra for IT Professionals in the Wake of Equifax
Once again, we have a basic failure in cyber hygiene causing a massive data breach. This one affects potentially half of the U.S. population and compromises particularly sensitive personal information that can be used by criminals to wreak havoc on people’s bank accounts, credit scores and identities. I’m referring, of course, to the Equifax breach. What I find particularly disturbing is that criminals took advantage of a known vulnerability for which a patch had been av ...
Follow
45
A Call for Congress to Prioritize Modernizing Government Technology
While we’ve already seen Congress engage in fierce debates over fiscal year 2018 funding, it’s important to remember that there are bipartisan issues on the table. Upgrading and modernizing government IT systems is one such area that deserves continued focus. That’s why we were pleased to see the Senate pass the 2017 National Defense Authorization Act (NDAA) with the Modernizing Government Technology (MGT) Act as an amendment from Sens. Jerry Moran (R-KS) and Tom Udall (D-NM). ...
Follow
344
Piriform CCleaner Remote Backdoor
CCleaner, a popular application used for performing routine maintenance on systems, was recently found to contain a malicious backdoor. This could allow a remote attacker to extract sensitive data from the host, or execute malicious code on the host. Vulnerability details A malicious modification of the 32-bit CCleaner.exe binary (CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191) contains a two-stage backdoor that allows a remote attacker to execute code on an ...
Follow
39
Is DevOps the Best Thing to Ever Happen to Security?
Many of us have heard this story before, and it goes something like this: Developers are focused on one thing and one thing only - speed. They expunge anything that gets in their way or slows them down. And they can, because successful DevOps is becoming a core competitive differentiator for many organizations. Security leaders are focused on one thing and one thing only - risk. They are vigilant with ensuring compliance with enterprise policy and abhor change. And they can, because major cyber ...
Follow
128
Protecting Your Bluetooth Devices from BlueBorne
A new attack vector, codenamed BlueBorne, can potentially affect all devices with Bluetooth capabilities – ordinary computers, mobile phones, and IoT devices – literally billions of devices in the world today. Hackers can use this attack vector to leverage Bluetooth connections to completely take over targeted devices. BlueBorne spreads through the air, allowing it to bypass all security measures and potentially infect even “air-gapped” networks. The attack does not requ ...
Follow
Don\'t miss our Introduction to Tenable.IO.  Two times tomorrow - 10am GMT for our EMEA audience and 2pm EST for North America.  Copy this to your browser: https://www.tenable.com/webinars/introducing-tenable-io-emea? utm_promoter=tenable&utm_source=cybraryit&utm_medium=referral&utm_campaign=cybraryitchannel

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel