We could not find any results for:
Make sure your spelling is correct or try broadening your search.
Share Name | Share Symbol | Market | Type |
---|---|---|---|
Tenable Holdings Inc | NASDAQ:TENB | NASDAQ | Common Stock |
Price Change | % Change | Share Price | Bid Price | Offer Price | High Price | Low Price | Open Price | Shares Traded | Last Trade | |
---|---|---|---|---|---|---|---|---|---|---|
-0.61 | -1.35% | 44.60 | 39.64 | 47.72 | 45.66 | 43.60 | 45.57 | 954,962 | 22:30:00 |
|
Tenable’s last report, “Quantifying the Attacker’s First-Mover Advantage,” revealed that attackers generally have a median seven-day window of opportunity to exploit a known vulnerability, before defenders have even determined they are vulnerable. The resulting seven-day gap is directly related to how enterprises are conducting vulnerability assessments -- the more strategic and mature the approach, the smaller the gap is likely to be and the lesser the risk to the business.
“In the not too distant future, there will be two types of organizations -- those who rise to the challenge of reducing cyber risk and those who fail to adapt to a constantly evolving and accelerating threat landscape in modern computing environments,” said Tom Parsons, senior director of product management, Tenable. “This research is a call to action for our industry to get serious about giving the advantage back to cyber defenders, starting with the rigorous and disciplined assessment of vulnerabilities as the basis for mature vulnerability management and ultimately, Cyber Exposure.”
Tenable Research analyzed telemetry data for over three months from organizations in more than 60 different countries using data science to identify distinct security maturity styles and strategic insights which can help organizations manage, measure and ultimately reduce cyber risk. The objective was to analyze and ultimately help to improve how defenders are responding.
Key findings include:
• | There are four distinct strategies of vulnerability assessment: | |
| ||
• | Across all levels of maturity, organizations benefit from avoiding a scattershot approach to vulnerability assessment and instead making strategic decisions and employing more mature tactics such as frequent, authenticated scans to improve the efficacy of vulnerability assessment programs. |
For more information on the research, read the Tenable Research blog post here, https://www.tenable.com/blog/how-mature-are-your-cyber-defender-strategies.
Visit Tenable at Black Hat USA 2018 in Las Vegas (booth 404).
About TenableTenable®, Inc. is the Cyber Exposure company. Over 24,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include 53 percent of the Fortune 500, 29 percent of the Global 2000 and large government agencies. Learn more at tenable.com.
Contact Information:Cayla Baker Tenable tenablepr@tenable.com 443-545-2102, x 1544
A photo accompanying this announcement is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/808f4cdd-bfc6-4f7a-b4f6-9d30e2198a66
1 Year Tenable Chart |
1 Month Tenable Chart |
It looks like you are not logged in. Click the button below to log in and keep track of your recent history.
Support: +44 (0) 203 8794 460 | support@advfn.com
By accessing the services available at ADVFN you are agreeing to be bound by ADVFN's Terms & Conditions