Story image

Threat prioritisation feature announced for Tenable platforms

12 Feb 2019

Tenable has announced the general availability of Predictive Prioritisation, an offering that aims to change how organisations tackle vulnerabilities.

Predictive Prioritisation enables organisations to reduce business risk by focusing on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.

This capability is generally available within the company’s on-premises vulnerability management offering — Tenable.sc (formerly SecurityCenter) — which is a core component of the Tenable Cyber Exposure platform.

Effectively prioritising vulnerabilities is fundamental to cybersecurity.

Yet, knowing where an organisation is most exposed to threats is increasingly daunting given the volume of vulnerabilities.

According to the National Vulnerability Database, there were 16,500 new vulnerabilities disclosed in 2018 alone, of which only a small fraction was actively weaponised for cyber attacks.

This deluge of vulnerabilities, combined with the inability to identify those that pose an actual threat to the business, leaves organisations unable to effectively measure, manage and reduce their risk.

Predictive Prioritisation aims to address this problem.

It analyses Tenable vulnerability data combined with third-party vulnerability data and threat intelligence across 150 data sources using a proprietary machine learning algorithm to predict the likelihood a vulnerability will be exploited in the next 28 days.

This means organisations will be able to evolve their vulnerability remediation efforts from reactive to predictive by focusing on the three percent of issues that could and likely will be exploited.

This threat-centric model is a critical component of modern vulnerability management, hence Tenable has made Predictive Prioritisation a core feature of its vulnerability management platform offerings.

Tenable co-founder and chief technology officer Renaud Deraison says, “Predictive Prioritisation will change the way companies run their vulnerability management programs by giving them a new level of insight on where to focus based on threats to the business.”

“Predictive Prioritisation will help organisations answer foundational questions about where they’re exposed and what vulnerabilities to prioritise for remediation based on the threat landscape -- two questions that are critical for achieving Cyber Exposure.”

Predictive Prioritisation is generally available in Tenable.sc 5.9, for on-premises vulnerability management.

Predictive Prioritisation will be generally available in Tenable.io, for cloud-based vulnerability management, later in 2019.

Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.