Background Information MINDEF, the Ministry of Defence of the nation (Malaysia), located in the Asia Pacific region, is responsible for executing government defense policy, with the main goals of protecting the country and its interests and enhancing global peace and stability. To upgrade the nation’s military defense against cyber warfare and provide top-grade vulnerability management,
The paradigm shift from vulnerability to threat, and then to risk, is not new to those who have been in the cybersecurity industry for a long time. It is a systematic approach that involves identifying vulnerabilities, understanding the threats that can exploit them, and evaluating the potential risks associated with the threats. While this approach
Introduction In today’s ever-evolving digital landscape, patch management has become an essential practice for organizations of all sizes. With new technologies emerging rapidly, the need for effective and efficient patch management solutions continues to grow. The purpose of patch management is to ensure that software and systems are up to date with the latest security
Cyber threats are expanding and could lead to various negative impacts including data breach, financial loss and reputational damage. Threat, Risk, and Vulnerability management solutions are important in providing organisations with the combination of tools, processes and best practices that can help them proactively manage their security risks. As the leading company in delivering enterprise
What is Tenable One? Ransomware are expanding at exponential rate. Multiple platforms had been introduced as solutions. Subsequently, numerous platforms come with different metrics, reporting, and training requirements which made it difficult for organisations to communicate their cyber risks – Hence, Tenable introduces the release of Tenable One as an ultimate solution. What is Tenable
What is Nessus Expert? Nessus Expert is a vulnerability assessment solution for your modern attack surface built on the foundation of Nessus Professional. It is built by Tenable for security practitioners, consultants, developers and pentesters to address threats that can impact the your ever expanding attack surface through the addition of Infrastructure as Code (IaC)
Tenable was founded in 2002 as Tenable Network Security, inc. It is well known as the creator of the vulnerability scanning software Nessus, where in the very beginning it was open source until being closed source. In 2018 public listed. If you follow the cybersecurity industry for long, you will notice that since 2012 Tenable
Depend on the context and use case, and how the specific enterprise is divide the structure to get things done, in the domain of governance, risk management and compliance (GRC) in the high level, or to more operational level of threat and vulnerability management (TVM) or to tactical level of threat intelligence feeds (IT feeds)
From Cyber threat intelligence to Threat intelligence feed, both carry some similarity but are two different things, despite both fall under the threat intelligence domain, where most of the people do not understand it clearly. We use the post to help open and clarify both. Cyber Threat Intelligence (CTI) , or mostly will be shortened
Today, Attack Surface Management had become the top priority for security team and risk management leaders. The reasons are the increase in cyber risk where attack surface is expanding due to digital transformation and cloud migration, as well as lack of visibility of assets including, unknown, unmanaged and poorly-managed assets making organisations at greater risk