Can the security community grow up?

By Morgan Dickinson At Black Hat, Amit Yoran talks to TechCrunch about the security community's growing pains. Source:: Tenable News … [Read more...]

Inside the Kronos malware – part 1

By hasherezade Recently, a researcher nicknamed MalwareTech famous from stopping the WannaCry ransomware, got arrested for his alleged contribution into creating the Kronos banking malware. We are still not having a clear picture whether the allegations are true or not – but let's have a look at Kronos itself. Background This malware has been first advertised on the black market since around … [Read more...]

Thycotic’s Secret Server Honored as Gold Winner in the 9th Annual 2017 Golden Bridge Awards®

By Jordan True Washington, D.C. — August 18, 2017 — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide has earned the prestigious Gold status in the Golden Bridge Awards® for their Secret Server 10.1 solution within the Innovations in Technology – Security Software category. The coveted annual Golden Bridge Awards program encompasses … [Read more...]

Cyber CEOs urge NIST Framework be made a part of NAFTA talks

By Cayla Baker Amit Yoran speaks to CyberScoop about why the use of cybersecurity frameworks should be incorporated into NAFTA renegotiations. Source:: Tenable News … [Read more...]

Tenable Launches New Channel Program To Help Partners Drive Sales Around Cloud, IoT Security

By Morgan Dickinson Chris Peterson talks to CRN about the new Tenable Assure Partner Program, which is designed to help organizations close the Cyber Exposure gap. Source:: Tenable News … [Read more...]

Thycotic Named to Inc. 5000 Fastest Growing Company for Fifth Year in a Row

By Jordan True Washington, D.C. — August 17, 2017 — Inc. Magazine today ranked Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, No. 2,260 on its 36th annual Inc. 5000, the most prestigious ranking of the nation's fastest-growing private companies. The list represents a unique look at the most successful companies within the … [Read more...]

Best practices for changing your SMTP banner

By Casper Manes When systems connect to your email system's external connector, the only thing they must see is a 220 response, which is the SMTP response code that indicates the server can accept email. Source:: GFI TalkTechToMe-All … [Read more...]

Black Hat Hacker Insights: The easiest way hackers access your sensitive data

By Joseph Carson Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization's sensitive data? The response was that it's a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive information. You can read … [Read more...]

6 Hardware Tweaks that will Skyrocket your Hyper-V Performance

By Eric Siron Simple changes to your hardware settings can drastically improve Hyper-V performance. Find out what you need to change to optimize your Hyper-V environment.Read the post here: 6 Hardware Tweaks that will Skyrocket your Hyper-V Performance Source:: altaro … [Read more...]

Secure Configuration Baselines for Network Devices

By Justin Brown In a recent blog post, Ted Gary discussed results from a Tenable survey about configuration hardening at the system level. In short, organizations are making progress on enforcing and auditing their desktops and servers for secure configurations, but there is still a lot of work to do. While the whole realm of network devices was beyond the scope of the survey, it obviously can't … [Read more...]