Cybersecurity Awareness: Six Tips to Help Your Employees Be Cybersmart
October 7, 2021We believe it's time for a new approach to cyber awareness, one that borrows on the concept of the shared responsibility model common in cloud computing. Here's how we get there. How much considerati...
Protecting the Atomized Attack Surface: Cybersecurity in the New World of Work
September 22, 2021A new study reveals how moving to a remote workforce model and migrating business-critical functions to the cloud are exposing the vast majority of organizations to increased risk. The next 18 months...
Securing Classified Telework: 3 Principles for Protecting Sensitive Data
February 1, 2021As pandemic restrictions linger, federal agencies are preparing for a rise in classified telework. Here’s why a continued focus on cybersecurity fundamentals is imperative. The COVID-19 pandemic acce...
Choosing the Right Architecture for Your Nessus Agent Deployment
May 14, 2020As organizations adapt to work-from-home mandates, we detail the three most common configurations for securing your remote workforce using Nessus Agent deployments. In several of our recent blog post...
Coding from Home: 6 Simple Hacks for Boosting Your Productivity
April 28, 2020Working from home poses distinct challenges for engineers who rely on sustained periods of focus. Here are some survival tips from one of Tenable’s senior software engineers for staying productiv...
CVE-2020-9818, CVE-2020-9819: Multiple Zero-Day Vulnerabilities in iOS Mail App Exploited in the Wild
April 22, 2020Patches for a pair of critical iOS vulnerabilities that were reportedly exploited in the wild are now generally available. Users are strongly encouraged to upgrade to the latest version of iOS and iPa...
How to Deploy Nessus Agents to Remote Assets
April 17, 2020Nessus Agents are essential to help secure remote endpoints against dangerous vulnerabilities and misconfigurations. This post offers guidance on how to streamline agent deployment at scale. As organ...
Designing IT Infrastructure for a Distributed Workforce: Insights from a CIO
April 16, 2020As remote work becomes the rule rather than an exception, organizations need new ways of thinking about IT. Here are some steps you can take to deliver on the promise of a distribu...
Critical Vulnerabilities You Need to Find and Fix to Protect the Remote Workforce
April 13, 2020As uncertain times lead to a shift in how we work, identifying, prioritizing and addressing critical flaws that have been exploited in the wild is paramount. We recently shared some insights into how...
Zoom Patches Multiple Flaws and Responds to Security and Privacy Concerns
April 3, 2020Facing growing security concerns, Zoom patches multiple vulnerabilities and vows to focus on top safety and privacy issues. Background As more companies shift to remote work, their use of tools to s...
How to Secure a Work-from-Home Organization: Insights from a CSO
April 1, 2020Over the last few days, a slew of people have texted or called me for practical guidance on how to secure a global, work-from-home organization. So, I crafted this short-ish blog post, mostly as a pub...
How COVID-19 Response Is Expanding the Cyberattack Surface
March 30, 2020As organizations rapidly move to a remote-work model in response to COVID-19, cybersecurity professionals are facing a sudden expansion of the attack surface. Here’s what you need to consider from a v...