Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Tenable Network Security Podcast Episode 191 - "The Top 10 PVS Questions Answered"

Note: Passive Vulnerability Scanner (PVS) is now Nessus Network Monitor. To learn more about this application and its latest capabilities, visit the Nessus Network Monitor web page.

Announcements

Discussion & Highlighted Plugins

  1. What is the Passive Vulnerability Scanner (PVS) and what does it do?
  2. How is PVS different from an IDS?
  3. How does PVS keep track of sessions and discover applications?
  4. What are some examples of PVS detecting vulnerable client software?
  5. How can PVS help detect instances of virtualization in your environment?
  6. How can PVS be used to detect vulnerabilities in SCADA devices, and why is this important?
  7. What are some examples of PVS detecting applications?
  8. How much traffic can PVS handle?
  9. How can you set up and configure PVS to monitor the wireless network and detect vulnerabilities in smartphones and tablets?
  10. Does PVS support IPv6?

Nessus plugin topics:

  • Nessus now has the ability to upload a custom list of hashes for whitelisting processes and the ability to identify new processes previously not seen.
  • We've also added into Nessus the ability to set the number of days your anti-virus software is out of date before generating an alert.

Nessus

Passive Vulnerability Scanner

SecurityCenter Apps

Dashboards

Report Templates

Security News Stories

  1. ACG Maryland - 2013 Deal of the Year Finalist - Tenable Network Security & Accel Partners
  2. Risky Business Podcast #304 -- Tech heavyweights target NSA
  3. Why Ben Franklin would have excelled in cyber security
  4. Tenable Network Security Named a Deloitte 2013 Technology Fast 500 Award Winner
  5. Linux backdoor squirts code into SSH to keep its badness buried | The Register
  6. Hacking of forum software firm vBulletin spawns host of zero-day attacks | The Inquirer
  7. Netflixers Beware: Angler Exploit Kit Targets Silverlight Vulnerability
  8. Adobe credentials and the serious insecurity of password hints | Troy Hunt
  9. Tavis Ormandy: QNX
  10. w00tsec: Unpacking Firmware Images from Cable Modems

 

 

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.