Process-Led Deployment: How to Maximize Your Cyber Technology Investments
October 16, 2018Taking a process-led approach to your cyber technology deployments is critical to your organization’s ability to reduce risk. Too often, organizations focus on solution features and not on driving the...
Tenable Welcomes Diwakar Dayal to the Role of Managing Director, India and SAARC
August 28, 2018Dayal’s appointment to this newly created role demonstrates Tenable’s strong, ongoing commitment to the India and SAARC region. Today, I’m delighted to announce the appointment of Diwakar Dayal to ...
Cybersecurity Benchmarking: Where’s The Data?
July 30, 2018When it comes to communicating with the C-suite and Board of Directors about their organization’s cyber exposure, few IT and security professionals are happy with the benchmarking data currently avail...
Tenable IPO: Accelerating Our Vision
July 26, 2018Today, Tenable officially became a public company, trading on the Nasdaq under the ticker symbol TENB. As we embark on our new chapter as a public company, I want to take this moment to thank each of...
How to Secure Public Cloud and DevOps? Get Unified Visibility.
June 5, 2018One of the most transformative changes in the IT industry over the last decade has been the adoption of public cloud (IaaS) services such as AWS, Azure and GCP. Public clouds are more than “jus...
Eliminating the Attacker's Advantage - Why Original Research Matters
May 24, 2018One problem which has been lingering for too long in the security industry is the concept that “security research” has long been way more of an art than a science. As our industry matures, we need to ...
Tenable Pledges to Fight Global Cyberattacks with 33 Leading Companies
April 17, 2018In today’s digital economy, it has become paramount for companies to defend customers from malicious attacks by criminal enterprises and nation states. This is why Tenable, along with 33 other ...
Nessus Turns 20!
April 5, 2018Twenty years ago this week, I released the first public version of Nessus. Little did I know at the time the profound impact it would have both on the industry and on me personally. Over this period ...
An Infrastructure Plan in the 21st Century Needs to Address Cybersecurity
January 30, 2018U.S. President Trump is expected to discuss his long-awaited infrastructure plan in tonight’s State of the Union address, but we should not expect full details for a few more weeks. The focus on upgra...
Tracking Scan Authentication Failures
January 11, 2018IT systems change all the time. New applications are added, configurations are changed, permissions get revised – the list goes on and on. In some cases, the changes end up restricting access to...
Congress Achieves Real IT Modernization Progress
December 19, 2017We’ve talked about the need for Congress to prioritize upgrading and modernizing government IT systems for a while now, so we were glad to see the Senate recently pass the 2017 National Defense ...
New Study: Many Consumers Lack Understanding of Basic Cyber Hygiene
December 18, 2017Data breaches have been a headache for many years and for a long time there seemed to be a general apathy about them. Our sense was that things may have changed in the wake of the most severe breach e...