Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Megan Daudelin

Megan Daudelin's picture
Megan Daudelin is an Information Security Content Analyst at Tenable, developing research content for SecurityCenter. Megan specializes in content related to digital forensics and incident response. Prior to joining Tenable, Megan worked as a security analyst and digital forensic analyst. She is a GIAC Certified Forensic Analyst (GCFA) and GIAC Certified Intrusion Analyst (GCIA).
Blog Post
Wednesday, June 7, 2017

Credentialed scanning is a key aspect of any vulnerability management program, but how can you be sure the scans are successful? Changes to infrastructure or specific hosts could result in...

Blog Post
Wednesday, May 31, 2017

CISOs often ask “How vulnerable are we?” when presented with vulnerability metrics and reports. As the head of a security team, are you prepared to answer that question? The answer...

Blog Post
Tuesday, May 30, 2017

A ccording to the 2017 Verizon Data Breach Investigations Report (DBIR), privilege misuse accounts for approximately 15% of breaches and 18% of incidents among the organizations surveyed (page 38). Monitoring...

SC Dashboard
Friday, May 26, 2017

A seven-year-old remote code execution vulnerability affecting Samba is making news this week. Dubbed “SambaCry,” the vulnerability in *nix SMB protocol implementation versions 3.5.0 and higher may put organizations at great risk of exploitation. By leveraging data gathered by Nessus and PVS, this dashboard is able to give security teams detailed insight into systems in their networks that may be vulnerable to exploitation.

SC Dashboard
Thursday, May 4, 2017

Intel has released information about a major vulnerability that allows unprivileged attackers to gain control over certain manageability features through privilege escalation. Security teams should note that this vulnerability will not be remediated as part of normal patch releases and the affected firmware will need to be patched or updated manually. The INTEL-SA-00075 Detection dashboard is able to leverage data gathered by Nessus and PVS in order to alert security teams to potentially vulnerable hosts on their network.

SC Dashboard
Tuesday, April 18, 2017

The information published by the Shadow Brokers hacking group identified many major vulnerabilities in common operating systems and services. Failure to remediate impacted systems could leave the network susceptible to intrusion or exploitation. The Shadow Brokers Vulnerability Detection dashboard displays detailed information about the vulnerabilities and exploits discovered by the Shadow Brokers hacking group.

Blog Post
Wednesday, April 5, 2017

T he same services we use to connect our networks to the vast resources of the internet can be used against us if not properly secured. Many of the most...

SC Report Template
Wednesday, March 15, 2017

Monitoring for intrusions is one of the many challenges that organizations face. Security teams are tasked with preventing, detecting, and stopping intrusions. The Intrusion Monitoring report details events related to intrusions on the network and vulnerabilities that may leave the network exposed to intrusion.

SC Report Template
Monday, November 7, 2016

Monitoring common printers and related services for vulnerabilities is essential to securing a network against exploitation. Printers and supporting services are essential to organizations of all sizes, and as a result are a target for attackers. The Print Services Vulnerability Summary report provides insight into vulnerabilities associated with common printer vendors that may expose an organization to increased risk of exploitation.

SC Dashboard
Friday, November 4, 2016

Monitoring common printers and related services for vulnerabilities is essential to securing a network against exploitation. Printers and supporting services are essential to organizations of all sizes, and as a result are a target for attackers. The Print Services Vulnerability Summary dashboard provides insight into vulnerabilities associated with common printer vendors that may expose an organization to increased risk of exploitation.

Pages

Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security