Tenable.io Report
Thursday, February 16, 2023
The Tenable Cyber Insurance Report provides measurements for the foundation of a cyber risk management program for organizations. Organizations applying for cyber insurance are required to provide underwriters supporting evidence data that demonstrates the strength of their cybersecurity and risk management programs. Tenable.io provides organizations the ability to demonstrate risk management maturity with insurance companies.
Tenable.io Dashboard
Tuesday, November 8, 2022
Updated 26-Oct-2022: On November 3rd, 2021, CISA issued Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities which requires federal agencies to identify and remediate a CISA managed catalog of known exploited vulnerabilities on their information systems. This dashboard showcases mitigation of these vulnerabilities to ensure a reduced attack surface in the organization.
Tenable.io Dashboard
Tuesday, November 8, 2022
The proliferation of unsupported and end-of-life (EOL) products is a common security problem experienced across all organizations. As applications and operating systems reach EOL, vendors stop offering support, causing security and stability to decrease over time. This dashboard provides organizations with a clear and simplified method to identify EOL software and enables security managers to predict where risk will increase to develop a mitigation plan.
Tenable.io Dashboard
Monday, November 7, 2022
Organizations are typically overwhelmed with data that must be analyzed to determine the organization’s risk exposure. This dashboard helps prioritize remediation efforts by presenting lists of top hosts in various categories. The widgets on this dashboard leverage vulnerability scan information from Tenable.io Vulnerability Management (Nessus, NNM), Tenable Web Application Security (WAS), and Tenable.cs.
Tenable.io Dashboard
Monday, November 7, 2022
A compromised processor is one of the most serious attack vectors on any platform. The hardware bugs known as Spectre and Meltdown affect modern processors by accessing information found in the system's memory. The Spectre and Meltdown dashboard provides insight into which systems are affected by these hardware bugs.
Tenable.io Dashboard
Monday, November 7, 2022
Common exploit frameworks are easy to obtain and are used by security researchers and malicious attackers. Security analysts can effectively reduce risk to the organization by analyzing an exploit’s source tool and the most common targets.
Tenable.io Dashboard
Monday, November 7, 2022
Information Security Managers often face a difficult choice of what problem to solve first. With operational commitments conflicting with security risks from software vulnerabilities, do they apply the patch or take some focus on operations? This dashboard helps managers understand prioritize vulnerabilities remediation.
Tenable.io Dashboard
Thursday, November 3, 2022
Addressing vulnerable services is a key step in reducing network risk. Vulnerable services may allow malicious actors to infiltrate the network, compromise assets, and exfiltrate information. This dashboard presents vulnerability information by common TCP ports and services identify potentially vulnerable services.
Tenable.io Dashboard
Wednesday, November 2, 2022
New digital platforms and development shifts have rapidly moved from concept to capability. Tracking updates for the constantly changing landscape of assets is important to identify legacy code and asset footprint. This dashboard focuses on legacy patches and assets to reduce management effort and reactive firefighting.
Tenable.io Dashboard
Wednesday, November 2, 2022
Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.io uses the “Vulnerability State” attribute to track vulnerabilities at various stages, such as new vulnerabilities and vulnerabilities that have been fixed. This dashboard provides summary information of mitigation efforts.