Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Tenable Network Security Podcast Episode 178 - "PVS Free Trial, Control System Traps"

Announcements

Discussion & Highlighted Plugins

Passive Vulnerability Scanner (PVS) Update

  • At the recent Black Hat USA 2013 conference, we announced that PVS will be released as a standalone product, including a free trial. The interface was showcased at the Tenable booth on the show floor and met with a warm welcome. Users can interact with PVS using an HTML5 interface similar to Nessus. What are some of the most compelling use cases for PVS?

Industrial Control System (ICS) Honeypot

  • One of the most talked about presentations from Black Hat was given by researchers who created a fake ICS system, let attackers from across the globe "hack" it, and locate more than 70 different systems that fell into the trap. I believe this helps to raise awareness about security vulnerabilities in ICS systems and shows that attackers will take the opportunity to strike at these valuable targets. The question becomes: Is locating the attackers' systems against the law? Even better, is this valuable data?

Web Services Everywhere

  • One thing that always amazes me is just how many web services exist at any given time on an organization's network. While you must spend time analyzing the security of the applications you know about, you must also look at the web services that tend to hide on your network. So many devices and applications use web services for management, so the results can be overwhelming. Recently released SecurityCenter dashboards and reports help you get a handle on the different web services in your environment. Our products are able to collect detailed information about web services as they reveal information about themselves when you connect to the service, making it easy to identify, but difficult to keep on a leash. What types of web services are the most concerning in terms of a security threat, and what can you do about them?

New & Notable Plugins

Nessus

Passive Vulnerability Scanner

SecurityCenter Dashboards and Report Templates

Security News Stories

  1. admin to SYSTEM win7 with remote.exe
  2. Firefox Zero-Day Used in Child Porn Hunt?
  3. Chinese hackers take over fake water utility
  4. FBI allowed informants to break law more than 5,600 times in year
  5. Android Apps Can Access All of Your Google Account
  6. Posh potty owners flushed by dodgy Bluetooth password
  7. iOS Weaknesses Allow Attacks Via Trojan Chargers
  8. Water-Utility Honeynet Illuminates Real-world SCADA Threats
  9. Windows phones open to hackers when connecting to rogue Wi-Fi

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.