dcsimg

Three Vulnerability Intelligence Insights Worth Your Attention

<p>The <a href="https://www.tenable.com/cyber-exposure/vulnerability-intelligence">Vulne... Intelligence Report</a>, released today by Tenable Research, provides an overview of current vulnerability disclosure trends and insights into real-world vulnerability demographics in enterprise environments. Here are three highlights from the report.</p> <p>Because … [Read more...]

How Mature Are Your Cyber Defender Strategies?

Our latest research examines real-world vulnerability assessment practices at 2,100 organizations to understand how defenders are approaching this crucial step in cyber hygiene. For our latest research study, "Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal," we explore how organizations are practicing vulnerability assessment (VA), and what these practices teach … [Read more...]

Should You Still Prioritize Exploit Kit Vulnerabilities?

One of the greatest challenges that enterprises face is prioritizing vulnerabilities for remediation. Trying to determine which vulnerabilities pose a true imminent risk deserving of immediate attention can feel like a game of Whac-A-Mole due to the sheer volume of critical vulnerabilities. An analysis of CVE data by Tenable Reseach’s Lucas Tamagna-Darr shows the number of disclosed … [Read more...]

Quantifying the Attacker’s First-Mover Advantage

Tenable Research has just released a report on the difference in time between when an exploit is publicly available for a given vulnerability and the first time that a vulnerability is assessed. For this study, we analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period in late 2017 to anchor the … [Read more...]

Tenable Research: February and March Vulnerability Disclosure Roundup

Tenable Research has a dedicated team that performs vulnerability research on software and hardware from third-party vendors. The goal is to discover zero-day vulnerabilities and work with vendors to get them addressed before hackers discover and exploit them. This post provides an overview of all the vulnerabilities discovered by Tenable Research in February and March. You can access all Tenable … [Read more...]