Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

January 31, 2025

Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI

Check out the Cloud Security Alliance’s recommendations for rolling out AI apps securely. Meanwhile, a Deloitte survey found GenAI initiatives by cyber teams deliver the highest ROI to their orgs. Plus, the NSA urges orgs to combat GenAI deepfakes with content provenance tech. And get the latest on CISO trends; patch management; and data breach prevention.

March 10, 2023

Cybersecurity Snapshot: Find MITRE ATT&CK Complex? Need Help Mapping to It? There’s an App for That!

Learn about a new tool that streamlines MITRE ATT&CK mapping. Plus, known vulnerabilities remain a major cyber risk – just ask LastPass. Also, discover why SaaS data protection remains difficult. Plus, a look at the U.S. National Cybersecurity Strategy. And much more!...


March 9, 2023

A New Incentive for Using AWS VPC Endpoints

If you haven’t been using VPC endpoints until now, AWS' two new condition keys should make you consider doing so....


March 9, 2023

What's New in Tenable OT Security: Superior IT/OT/IoT Asset Discovery, Advanced Threat Detection and More

Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk....


March 9, 2023

The Challenges of Multi-Cloud Compliance

Organizations that use public clouds like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) understand that each platform does things its own way, and those differences create challenges for securing them all. In a recent episode of the Tenable Cloud Security Coffee Break we...


March 8, 2023

Managing Cloud Compliance and Security Posture with Cloud Compliance Tools

Why compliance and access security in the public cloud are so challenging – and how carefully-chosen CSPM tools can help....


March 6, 2023

Tenable Cyber Watch: Protecting Cyber Critical Infrastructure, Attackers Gain Upper Hand in Data Compromises, and more

This week’s edition of the Tenable Cyber Watch unpacks the challenges in protecting cyber critical infrastructure and addresses cyberthieves gaining the upper hand in data compromises. Also covered: Why organizations should brace themselves for more cyberattacks targeting accounting and financial da...


March 3, 2023

FBI and CISA Release Cybersecurity Advisory on Royal Ransomware Group

The FBI and CISA have released a joint Cybersecurity Advisory discussing the Royal ransomware group....


March 3, 2023

Cybersecurity Snapshot: A ChatGPT Special Edition About What Matters Most to Cyber Pros

Since ChatGPT’s release in November, the world has seemingly been on an “all day, every day” discussion about the generative AI chatbot’s impressive skills, evident limitations and potential to be used for good and evil. In this special edition, we highlight six things about ChatGPT that matter righ...


February 28, 2023

Tenable 2022 Threat Landscape Report: Reduce Your Exposure by Tackling Known Vulnerabilities

Tenable’s annual analysis of the security and threat landscape offers guidance to help security professionals navigate the expanding attack surface....


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >