Story image

Threat prioritisation feature announced for Tenable platforms

12 Feb 2019

Tenable has announced the general availability of Predictive Prioritisation, an offering that aims to change how organisations tackle vulnerabilities.

Predictive Prioritisation enables organisations to reduce business risk by focusing on the three percent of vulnerabilities with the greatest likelihood of being exploited in the next 28 days.

This capability is generally available within the company’s on-premises vulnerability management offering — Tenable.sc (formerly SecurityCenter) — which is a core component of the Tenable Cyber Exposure platform.

Effectively prioritising vulnerabilities is fundamental to cybersecurity.

Yet, knowing where an organisation is most exposed to threats is increasingly daunting given the volume of vulnerabilities.

According to the National Vulnerability Database, there were 16,500 new vulnerabilities disclosed in 2018 alone, of which only a small fraction was actively weaponised for cyber attacks.

This deluge of vulnerabilities, combined with the inability to identify those that pose an actual threat to the business, leaves organisations unable to effectively measure, manage and reduce their risk.

Predictive Prioritisation aims to address this problem.

It analyses Tenable vulnerability data combined with third-party vulnerability data and threat intelligence across 150 data sources using a proprietary machine learning algorithm to predict the likelihood a vulnerability will be exploited in the next 28 days.

This means organisations will be able to evolve their vulnerability remediation efforts from reactive to predictive by focusing on the three percent of issues that could and likely will be exploited.

This threat-centric model is a critical component of modern vulnerability management, hence Tenable has made Predictive Prioritisation a core feature of its vulnerability management platform offerings.

Tenable co-founder and chief technology officer Renaud Deraison says, “Predictive Prioritisation will change the way companies run their vulnerability management programs by giving them a new level of insight on where to focus based on threats to the business.”

“Predictive Prioritisation will help organisations answer foundational questions about where they’re exposed and what vulnerabilities to prioritise for remediation based on the threat landscape -- two questions that are critical for achieving Cyber Exposure.”

Predictive Prioritisation is generally available in Tenable.sc 5.9, for on-premises vulnerability management.

Predictive Prioritisation will be generally available in Tenable.io, for cloud-based vulnerability management, later in 2019.

WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
AI helping businesses stay ahead of threats - LogRhythm
AI is being used to anticipate new threats and mediate and minimise the damage caused by breaches.