Story image

Threat prioritisation feature announced for Tenable platforms

12 Feb 2019

Tenable has announced the general availability of Predictive Prioritisation, an offering that aims to change how organisations tackle vulnerabilities.

Predictive Prioritisation enables organisations to reduce business risk by focusing on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.

This capability is generally available within the company’s on-premises vulnerability management offering — Tenable.sc (formerly SecurityCenter) — which is a core component of the Tenable Cyber Exposure platform.

Effectively prioritising vulnerabilities is fundamental to cybersecurity.

Yet, knowing where an organisation is most exposed to threats is increasingly daunting given the volume of vulnerabilities.

According to the National Vulnerability Database, there were 16,500 new vulnerabilities disclosed in 2018 alone, of which only a small fraction was actively weaponised for cyber attacks.

This deluge of vulnerabilities, combined with the inability to identify those that pose an actual threat to the business, leaves organisations unable to effectively measure, manage and reduce their risk.

Predictive Prioritisation aims to address this problem.

It analyses Tenable vulnerability data combined with third-party vulnerability data and threat intelligence across 150 data sources using a proprietary machine learning algorithm to predict the likelihood a vulnerability will be exploited in the next 28 days.

This means organisations will be able to evolve their vulnerability remediation efforts from reactive to predictive by focusing on the three percent of issues that could and likely will be exploited.

This threat-centric model is a critical component of modern vulnerability management, hence Tenable has made Predictive Prioritisation a core feature of its vulnerability management platform offerings.

Tenable co-founder and chief technology officer Renaud Deraison says, “Predictive Prioritisation will change the way companies run their vulnerability management programs by giving them a new level of insight on where to focus based on threats to the business.”

“Predictive Prioritisation will help organisations answer foundational questions about where they’re exposed and what vulnerabilities to prioritise for remediation based on the threat landscape -- two questions that are critical for achieving Cyber Exposure.”

Predictive Prioritisation is generally available in Tenable.sc 5.9, for on-premises vulnerability management.

Predictive Prioritisation will be generally available in Tenable.io, for cloud-based vulnerability management, later in 2019.

Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
D-Link A/NZ launches new home wireless surveillance kit
The Omna Wire-Free Full HD cameras and accompanying Wi-Fi Hub offer a number of new features, including Alexa/Assistant support.
CSOs - are you prepared for cloud cryptojacking?
A recent report found that almost half of the organisations surveyed have malware in one of their cloud applications.
Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.