How to Use VPR to Manage Threats Prior to NVD Publication
May 22, 2020How does Tenable’s VPR score help users manage newly disclosed vulnerabilities, even before they’re published on the National Vulnerability Database (NVD)? Let’s find out. In April, we published...
How VPR Helped Prioritize the Most Dangerous CVEs in 2019
April 30, 2020How do VPR and CVSS compare when assessing the most dangerous CVEs in 2019? Let’s find out. Two weeks ago, we kicked off a blog series on vulnerability priority rating (VPR), with a post focused on t...
Coding from Home: 6 Simple Hacks for Boosting Your Productivity
April 28, 2020Working from home poses distinct challenges for engineers who rely on sustained periods of focus. Here are some survival tips from one of Tenable’s senior software engineers for staying productiv...
What Is VPR and How Is It Different from CVSS?
April 16, 2020This blog series will provide an in-depth discussion of vulnerability priority rating (VPR) from a number of different perspectives. Part one will focus on the distinguishing characteristics of VPR th...
Event Analysis Training – “Could you look at some odd IRC Connections?”
July 29, 2009<p>At one of the research sites that we monitor, an analyst noted that a few servers were consistently making a large number of IRC connections. These connections occurred in a periodic manner and appeared to be automated. This blog entry describes the various steps taken in analyzing the connections and historical data. We used Tenable’s log analysis, network monitoring and passive profiling solutions to perform this analysis, but the principals could be applied to various SIMs, NBADs and analytical tools.</p><p> </p>