Calculate, communicate and compare cyber exposure while managing risk with Tenable Lumin. For the first time ever, user can visualize and explore the Cyber Exposure, track risk reduction over time, and benchmark against their peers. Use Tenable Lumin, an advanced visualization, analytics and measurement solution, to understand and reduce the Cyber Exposure. Tenable Lumin transforms vulnerability data into
Last week’s Beirut explosion incident that happened in Lebanon shocked the world news. Near the capital of Lebanon, the port area of Beirut is completely wiped out due to the extensive explosive material that is being put in the warehouse here for over four (4) years without any actions being taken. Just like other mega
Networks were once the fences that protected businesses from external threats – a barrier only employees could access, fully controlled by the company. The upward push of smart workplace, telecommuting, virtual private networks and BYOD initiatives has modified all of it. Businesses are an increasing number of reliant on third-party applications and business partners, from
The Importance of Security Awareness and Training Security Awareness and Training are Important Information security, like everything else, is a human enterprise and is influenced by factors that impact the individual. It is well recognized that the greatest information security danger to any organization is not a particular process, technology, or equipment; rather, it is
IT: Risk Prone, but Overlooked! We’ve delved into the realm of Enterprise Risk Management in previous blogs, and now its time to take a look at a subset of ERM: IT Risk Management (ITRM). The publication Risk IT by ISACA notes that ITRM covers both the negative impacts and benefits to operations/service delivery by missing
Secure your host system and network assets from the Top 5 vulnerabilities threats Today’s high-tech network security appliances ensure a great job of keeping the vulnerabilities threats from invading your business. These vulnerabilities threats can increase the level of vulnerabilities and penetrates to your host system and network assets to obtain the confidential info and