Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

How to Implement CIEM – A Checklist

February 8, 2023

What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out.

How to Extract Data and Value from Tenable’s EASM Solution

February 8, 2023

It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data.

Tenable Cyber Watch: IoT Vendors Lack Vulnerability Disclosures, Cyber Ranks As Top Business Concern - Again, The GAO’s Frustrations with Federal Agencies Not Heeding their Cybersecurity Advice

February 6, 2023

This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the...

Cybersecurity Snapshot: As ChatGPT Fire Rages, NIST Issues AI Security Guidance

February 3, 2023

Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!

The Time Is Now for the U.S. Government To Help Africa Boost Cybersecurity

February 1, 2023

African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. 

How Attackers Can Exploit GCP’s Multicloud Workload Solution

February 1, 2023

A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations.

ProxyNotShell, OWASSRF, TabShell: Patch Your Microsoft Exchange Servers Now

January 31, 2023

Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended.

Tenable Cyber Watch: How CISOs Feel About Their Jobs, Why Devs Struggle with Security, Using AI to Reduce Risk

January 30, 2023

This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the com...

Sandworm APT Deploys New SwiftSlicer Wiper Using Active Directory Group Policy

January 27, 2023

Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer.

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

January 27, 2023

Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!

How Analyzing External Attack Surface Data Boosts Your Security Strategy 

January 26, 2023

Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely.

Tenable.sc 6.0: A Major Update that Boosts Visibility and Productivity

January 25, 2023

Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a global CVE search to help them focus their RBVM efforts on what’s most important.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.