dcsimg

Cyber Exposure: Taking a Holistic Approach to Vulnerability Management

Tenable’s six-part blog series explores the challenges involved in achieving a holistic cybersecurity strategy and provides tips and advice for advancing the discipline of Cyber Exposure in your enterprise. Piecemeal approaches to cybersecurity result in gaps and overlaps which, in turn, lead to unexpected vulnerabilities and unintended redundancies in budget and resource spend. This leaves your … [Read more...]

How Do Your Cyber Exposure Practices Stack Up to Those of Your Peers?

In part five of our six-part blog series, we explore the challenges facing organizations as they try to accurately answer the question: “How do we compare to our peers?” Here’s what you need to know. Achieving visibility into your organization’s attack surface is the fundamental first step to building a mature cybersecurity strategy. Once you’ve laid a strong foundation for your Cyber Exposure … [Read more...]

Metrics and Maturity: Benchmarking Your Cyber Exposure Over Time

In part four of our six-part blog series, we explore the challenges facing organizations as they try to accurately answer the question “How are we reducing our exposure over time.” Here’s what you need to know. When you’re tasked with addressing thousands of vulnerabilities per year, it’s hard to imagine having the luxury to pause and assess your current performance against prior periods. But the … [Read more...]

Here Are the Answers to Your Predictive Prioritization Questions

16,500 new vulnerabilities were disclosed in 2018 – and CVSS categorized the majority as high or critical. With vulnerabilities on the rise, how can you identify the biggest threats to your business – and know what to fix first? Predictive Prioritization is an innovative process that changes how organizations tackle vulnerability overload, enabling you to zero in on remediating the vulnerabilities … [Read more...]

5 Tips for Prioritizing Vulnerabilities Based on Risk

In part three of our six-part blog series on improving your cybersecurity strategy, we discuss the challenges organizations face in pinpointing those vulnerabilities which pose the greatest threat to their business, and offer five tips for improving your prioritization efforts. The number of vulnerabilities has nearly doubled in the past two years. But the number of vulnerabilities being exploited … [Read more...]

RSAC 2019: New Approaches for Reducing Your Cyber Exposure

Vulnerability overload got you down? Attend my talk at the RSA Conference 2019 and learn about a new approach to cyber risk management. It's that time of year again - the RSA Conference (RSAC) 2019 descends on San Francisco March 4-8. The crowds will likely be thicker than ever. The lines for just about everything even longer. But the biggest problem for those inside the Moscone Center is deciding … [Read more...]

RSAC 2019: New Approaches for Reducing Your Cyber Exposure

Vulnerability overload got you down? Attend my talk at the RSA Conference 2019 and learn about a new approach to cyber risk management. It's that time of year again - the RSA Conference (RSAC) 2019 descends on San Francisco March 4-8. The crowds will likely be thicker than ever. The lines for just about everything even longer. But the biggest problem for those inside the Moscone Center is deciding … [Read more...]

Overcoming Your Vulnerability Overload with Predictive Prioritization

Tenable introduces Predictive Prioritization, a groundbreaking, data science-based process that re-prioritizes each vulnerability based on the likelihood it will be leveraged in an attack. Are you feeling overloaded by the number of vulnerabilities facing your organization daily? You’re not alone. There were 16,500 new vulnerabilities in 2018. The ‘good’ news is that only 7% of these … [Read more...]

Cyber Risk Management in Transition: Key Findings from ESG’s Cyber Risk Management Survey

A recent ESG report shows the traditional approach to cyber risk management isn’t working anymore, if in fact it ever did. Here, we share four highlights from the report and offer two steps to help improve your organization’s strategy. To gain insight into how cyber risk management is changing to support organizational missions and initiatives, the Enterprise Strategy Group (ESG) surveyed 340 … [Read more...]

Top 5 Cybersecurity Priorities for 2019: Ponemon Study

<p>We asked 2,410 IT and cybersecurity decision-makers in six countries to identify their top cybersecurity and governance priorities for the New Year. Here’s what we learned.</p> <p>What are your top cybersecurity concerns for 2019? Tenable commissioned Ponemon Institute to conduct a survey of 2,410 IT and cybersecurity professionals in six countries to find … [Read more...]