Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

July 4, 2025

Cybersecurity Snapshot: Expert Advice for Boosting AI Security

With businesses going gaga for artificial intelligence, securing AI systems has become a key priority and a top challenge for cybersecurity teams, as they scramble to master this emerging and evolving field. In this special edition of the Cybersecurity Snapshot, we highlight some of the best practices and insights that experts have provided so far in 2025 for AI security.

September 22, 2009

Logs of Our Fathers

<p>At USENIX in Anaheim, back in 2005, George Dyson treated us to a fantastic keynote speech about the early history of computing. You can catch a videotaped reprise of it <a href="http://www.ted.com/talks/lang/eng/george_dyson_at_the_birth_of_the_computer.html" target="_blank">here, on the TED site...


29. Juli 2009

Event Analysis Training – “Could you look at some odd IRC Connections?”

<p>At one of the research sites that we monitor, an analyst noted that a few servers were consistently making a large number of IRC connections. These connections occurred in a periodic manner and appeared to be automated. This blog entry describes the various steps taken in analyzing the connection...


By  Ron Gula
16. März 2009

Auditing PHP Settings to OWASP Recommendations with Nessus

<p>Tenable recently released an audit policy for Linux servers running PHP which tests for hardening recommendations from the Open Web Application Security Project (<a href="http://www.owasp.org/index.php/Main_Page">OWASP</a>). OWASP maintains a set of guidelines for hardening web servers, with spec...


By  Ron Gula
12, 2009. Februar

ShmooCon 2009 - Playing Poker for Charity

Tenable sponsored a booth at this year&#39;s ShmooCon and ran a Texas Hold&#39;em table to help raise money for the Hackers for Charity organization. We raised close to $400 from conference attendees and scheduled &quot;guest&quot; players such as Paul Asadoorian from PaulDot.Com, Simple Nomad from ...


By  Ron Gula
5. Januar 2009

DOJOSEC - Compliance Presentation

The next DOJOSEC is this week. I've been invited to speak about the latest compliance trends in PCI and FDCC. Also presenting will be Shaf Ramsey of TechGaurd Security and Dale Beauchamp of the Transportation Security Administration. Mr. Ramsey will discuss the future of virtual worlds such as HIPIH...


By  Ron Gula
14. Dezember 2008

Marcus Ranum PaulDotCom Interview on Penetration Testing

Tenable's CSO, Marcus Ranum, was recently interviewed on the PaulDotCom Security Weekly podcast. They discussed a wide range of topics regarding penetration testing, secure coding, Marcus's "6 Dumbest Ideas" in computer security and much more.Full PaulDotCom show notes.Direct link to the show's MP3 ...


By  Ron Gula
4, 2008. November

PCI Executive Roundtables in New York and Atlanta

Tenable Network Security has partnered with IANS to sponsor two executive level PCI discussions in New York City and Atlanta. Both events are this week, and we have limited seating available for corporations who are facing the challenges of being and demonstrating PCI compliance. Questions to be ans...


By  Ron Gula
4, 2008. April

Nessus turns 10 !

Ten years ago today, I announced the initial public release of Nessus on the bugtraq mailing list. The initial version would run only on Linux and was bundled with 50 plugins (vulnerability checks) written in C. At that time I was 18 and I had no idea I would still work on it years later (or that an...


10. Oktober 2007

Being the Caveman - Tenable Style

After reading Richard Bejtlich's &quot;Be the Caveman&quot; blog post about the convicted hacker Robert Moore, I felt it would be interesting to show how unifying vulnerability monitoring, configuration auditing, passive network discovery and log analysis helps organizations detect intruders. This b...


By  Ron Gula

Aktuelles zum Thema Cybersecurity

Geben Sie Ihre E-Mail-Adresse ein, um zeitnahe Warnungen und Sicherheitsempfehlungen von den Experten bei Tenable zu erhalten.

Ein Einblick in das Ransomware-Ökosystem

Bericht herunterladen >