How We Track Critical Compliance Metrics (4-part blog series)

This is part two in our four-part blog series exploring how we use the Tanium platform in our own organization. In part one, we revealed how we track critical vulnerabilities. In this installment, SecOps Engineer Greg Pothier shares his story about how a routine compliance check revealed six new servers which had previously been un-assessed....

Where Compliance and Security Hygiene Meet: Exploring The PCI TLS Encryption Update

If you’re looking at compliance as the endgame of your overall security hygiene practices, you’ll be missing out on crucial updates. The looming PCI TLS encryption upgrade offers us a prime case in point. Compliance and security hygiene go hand-in-hand. Conventional wisdom posits that the more compliant you are the better your security hygiene program will...

The 5 Questions You Must Answer for Good Security Hygiene

We all know IT professionals move too frequently between fires. The demands of overly complex infrastructure, continual threats, and time-strapped IT Security teams mean leaders must go to where the smoke is, only occasionally stopping to ask themselves “Am I making any progress?” To begin to answer this question, you must start with another question…five...

Compliance doesn’t have to be a risky business: Introducing Tanium Comply

Today we’re announcing the latest Tanium product module, Tanium ComplyTM. Enabled by Tanium’s unmatched speed at scale, Comply transforms the lengthy and unreliable work of validating endpoint security configuration into an activity that can be done accurately in minutes, no matter how many endpoints you have. Compliance is likely to rank high on any CIO’s...