Artwork

Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Tenable Network Security Podcast - Episode 185

 
Share
 

Archived series ("HTTP Redirect" status)

Replaced by: Tenable Network Security Podcast

When? This feed was archived on February 22, 2018 14:37 (6y ago). Last successful fetch was on August 28, 2017 12:42 (6+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 49840005 series 51047
Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

"We Don't Have Those On Our Network" - I hear this quite often from folks, especially when presenting on embedded device security issues. Those running enterprise, or even smaller, networks will state that entire categories of devices, such as Apple TV, are not in use on the network. Recently I've been highlighting the use of the network search engine Shodan to illustrate the fact that large organizations do in fact have home-based network gear. Furthermore, folks tend to find ways to use technology in the workplace to get things done. For example, someone stated they have an Apple TV in every conference room and use it for presentations. This is a great use-case for passive vulnerability scanning, finding the device in use by your organization. I'm not saying you shouldn't let the devices come on the network, but that they should receive some level of security which can only be accomplished if you know whats in use.

Mobile Dashboards - Another great example of technology in use at the workplace is smartphones and tablets. The undeniable fact that such devices improve productivity has earned them a permanent place in our IT infrastructure. The amazing fact about Nessus and SecurityCenter is that you can collect information about smartphones and tablets natively from your environment to enforce policy. Nessus/SecurityCenter will use the information stored in Active Directory to list the devices in use and associated vulnerabilities. The Passive Vulnerability Scanner will collect data from the network and report on which devices and apps are in use, as well as associated vulnerabilities. All of this can be rolled up into Dashboards and Reports to aid the effort of both creating and enforcing policy.

  continue reading

210 episodes

Artwork
iconShare
 

Archived series ("HTTP Redirect" status)

Replaced by: Tenable Network Security Podcast

When? This feed was archived on February 22, 2018 14:37 (6y ago). Last successful fetch was on August 28, 2017 12:42 (6+ y ago)

Why? HTTP Redirect status. The feed permanently redirected to another series.

What now? If you were subscribed to this series when it was replaced, you will now be subscribed to the replacement series. This series will no longer be checked for updates. If you believe this to be in error, please check if the publisher's feed link below is valid and contact support to request the feed be restored or if you have any other concerns about this.

Manage episode 49840005 series 51047
Content provided by Tenable Network Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tenable Network Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

"We Don't Have Those On Our Network" - I hear this quite often from folks, especially when presenting on embedded device security issues. Those running enterprise, or even smaller, networks will state that entire categories of devices, such as Apple TV, are not in use on the network. Recently I've been highlighting the use of the network search engine Shodan to illustrate the fact that large organizations do in fact have home-based network gear. Furthermore, folks tend to find ways to use technology in the workplace to get things done. For example, someone stated they have an Apple TV in every conference room and use it for presentations. This is a great use-case for passive vulnerability scanning, finding the device in use by your organization. I'm not saying you shouldn't let the devices come on the network, but that they should receive some level of security which can only be accomplished if you know whats in use.

Mobile Dashboards - Another great example of technology in use at the workplace is smartphones and tablets. The undeniable fact that such devices improve productivity has earned them a permanent place in our IT infrastructure. The amazing fact about Nessus and SecurityCenter is that you can collect information about smartphones and tablets natively from your environment to enforce policy. Nessus/SecurityCenter will use the information stored in Active Directory to list the devices in use and associated vulnerabilities. The Passive Vulnerability Scanner will collect data from the network and report on which devices and apps are in use, as well as associated vulnerabilities. All of this can be rolled up into Dashboards and Reports to aid the effort of both creating and enforcing policy.

  continue reading

210 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide