Cloud Security , Events , Governance & Risk Management

Bug-Fixing Imperative: 'Patch, Protect or Pray'

Tenable's Jack Huffard Sees Vulnerability Management Moving to Cloud
Jack Huffard of Tenable

Rapid patching and adoption of updated software has long been a "must do" security imperative. But many organizations have yet to master the patch-management challenge by getting fixes for flaws into place rapidly, as most recently demonstrated by the WannaCry ransomware attack, which compromised systems running outdated versions of Windows, notes Jack Huffard, president and COO of Tenable.

See Also: Expel: Firms Still Threatened by Old Vulnerabilities

In a video interview at the recent Infosecurity Europe conference in London, Huffard discusses:

  • The imperative to "patch, protect or pay";
  • The vulnerability management and container security marketplace;
  • The evolution of the Nessus vulnerability scanner to the cloud-based Tenable.io.

Huffard co-founded Tenable Network Security 2002 - together with Renaud Deraison and Ron Gula - and is responsible for driving global revenue growth and leading Tenable's corporate strategy and growth. Previously, he was the director of corporate development for Enterasys Networks and held management and sales positions at John Hancock and Marriott Corp.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.