Remove agency-directory
article thumbnail

NSTAC Aces Zero Trust Recommendations for Protecting Government Entities

Tenable

Government agencies must coordinate and collaborate to ensure they can identify, manage, and reduce risk in real time. The Cybersecurity and Infrastructure Security Agency (CISA) understands the importance of this, and is looking at how it can update the CDM program to better connect with zero trust.

article thumbnail

Government Advisories Warn of APT Activity Resulting from Russian Invasion of Ukraine

Tenable

Government agencies publish warnings and guidance for organizations to defend themselves against advanced persistent threat groups. In January, CISA, the Federal Bureau of Investigation (FBI) and National Security Agency (NSA) issued a joint cybersecurity alert regarding “Russian Cyber Threats to U.S. Background. CVE-2019-11510.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Using the Service Location Protocol (SLP) to Find Exposed Management Interfaces

Tenable

The Cybersecurity and Infrastructure Security Agency (CISA) recently published Binding Operational Directive (BOD) 23-02 instructing U.S. federal agencies to get management interfaces off the internet in order to mitigate risk. federal government agencies, the issue is important to any organization. CISA intends to scan U.S.

article thumbnail

How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines

Tenable

Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how. In alignment with the U.S.

article thumbnail

Active Directory is Now in the Ransomware Crosshairs

Tenable

A flurry of ransomware operators are now targeting Active Directory (AD) as a core step in the attack path. Over the past several months, a number of ransomware operators have concentrated their focus on Active Directory (AD) as a core step in their attack path. When executed on an Active Directory Domain Controller, LockBit 2.0

article thumbnail

How Well-established Enterprises Can Achieve Innovation without Disruption

CIO

Today, Netflix is a streaming juggernaut producing award-winning content and the Yellow Pages’ website, Yell.com, is one of the world’s largest online directories used by millions of businesses. Decades ago, Netflix mailed DVDs to homes and a copy of the Yellow Pages was next to every landline phone.

article thumbnail

Disrupting Attack Paths: Why Tenable's Acquisition of Alsid Matters

Tenable

This acquisition allows us to combine Tenable's ability to assess the state of the digital infrastructure with Alsid's ability to assess the state of Active Directory, helping security professionals answer the question: how secure are we? offers users a risk-based, proactive approach to finding and fixing weaknesses in Active Directory.