dcsimg

Introducing Tenable.ep: The First Risk-Based VM Platform as Dynamic as Your Attack Surface

Conquering your cyber risk requires a new approach to vulnerability management. With Tenable.ep, security teams gain a single, flexible license that enhances visibility and eliminates friction, so you can reduce the greatest risk with the least effort. Over the past several years, I’ve talked with numerous IT and security professionals who are struggling to keep up with a changing attack … [Read more...]

Conquer Your Cyber Risk: Advanced Capabilities in Tenable Lumin That Help

Key security metrics in Tenable Lumin reveal how effectively your team scans for vulnerabilities and remediates critical issues, so you can make process improvements where they matter most.  If you’ve made the move from legacy vulnerability management (VM) to a risk-based strategy, you already know the power of prioritizing your remediation efforts. The best way to start reducing risk across your … [Read more...]

A Practitioner’s Perspective on Risk-Based VM: What People, Processes and Technologies Are Required?

Moving from legacy vulnerability management to a risk-based approach can be a paradigm shift, requiring not only new technologies, but changes in your existing processes and procedures. Here’s a brief overview of how you can get started. Vulnerability management can often feel like a never-ending game of Whac-a-Mole. Fix one vulnerability and several more pop up elsewhere. As the number of new … [Read more...]

Not All Vulnerabilities Are Created Alike: Focus on What Matters Most

As the number of security vulnerabilities continues to skyrocket, prioritization is necessary for organizations to effectively reduce their cyber risk. For more than two years, I’ve explained to security professionals at all levels that the dramatic increase in vulnerabilities discovered each year, coupled with the expanding attack surface from the emergence of modern networks, has created the … [Read more...]

Learn How To Embrace Risk-Based Vulnerability Management

Legacy vulnerability management tools can no longer keep up with the expanding attack surface. Now is the time to focus your remediation efforts on the vulnerabilities that pose the greatest risk to your business.  There’s a growing understanding among security professionals that legacy vulnerability management tools simply aren’t cutting it anymore. Between the expanding attack surface, the … [Read more...]

Why You Need to Stop Using CVSS for Vulnerability Prioritization

Most cybersecurity teams rely on the Common Vulnerability Scoring System (CVSS) to prioritize their vulnerability remediation efforts. But, they fail to realize that CVSS is an outdated, ineffective method that causes them to waste the majority of their valuable time on vulnerabilities that pose little to no risk. Here’s what to do instead. For the past 20 years, security professionals have … [Read more...]