Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Everybody Does Good VM When S#*t Hits the Fan 

June 9, 2022

Ever notice how security teams operate more efficiently during a crisis? We need to take the same approach to security all the time. To help you get started, here are four best practices – and a new Tenable.io feature. 

AWS, Azure and GCP: The Ultimate IAM Comparison

June 8, 2022

AWS vs. Azure vs. GCP — how do these cloud providers compare when it comes to IAM? Read on to find out.

So Many CVEs, So Little Time: Zero In and ‘Zero Click’ into the Current Vulnerability Landscape

June 8, 2022

Among the thousands of vulnerabilities disclosed so far in 2022, we highlight five and explain why they matter.

Bringing External Attack Surface Management to the Masses with Bit Discovery

June 6, 2022

External Attack Surface Management (EASM) is an essential foundation of cybersecurity best practices. Soon, you’ll be able to take advantage of automated attack surface discovery in Tenable products.

CVE-2022-26134: Zero-Day Vulnerability in Atlassian Confluence Server and Data Center Exploited in the Wild

June 3, 2022

A critical vulnerability in Atlassian Confluence Server and Data Center has been exploited in the wild by multiple threat actors. Organizations should review and implement mitigation guidance until a patch becomes available.

How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens

June 1, 2022

A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants, fuel pipelines, water treatment plants and similar facilities?

CVE-2022-30190: Zero Click Zero Day in Microsoft Support Diagnostic Tool Exploited in the Wild

May 31, 2022

Microsoft confirms remote code execution vulnerability in Microsoft Windows Support Diagnostic Tool that has been exploited in the wild since at least April.

Twitter Crypto Scams: Bored Ape Yacht Club, Azuki and Other Projects Impersonated to Steal NFTs, Digital Currencies

May 26, 2022

Scammers are using verified and unverified accounts to impersonate notable NFT projects like Bored Ape Yacht Club and others, tagging Twitter users to drive them to phishing websites.

Security Improvements for Our Ecommerce Customers

May 25, 2022

We were recently informed by Kulkan Security of a design flaw in our third-party ecommerce fulfillment system, cleverbridge, that could have potentially allowed customers to accidentally disclose thei...

6 Tips for Successfully Securing Your AWS Environment

May 25, 2022

Top six actions and practices you can take to protect your AWS environment today.

How State and Local Governments Can Bolster their Cyber Defenses

May 24, 2022

Cybersecurity leaders of U.S. cities and states must protect their systems and data from nation-state attackers, including Russian hackers.

How To Make Your SOC Identity-Aware and Efficient

May 23, 2022

While an attacker only needs to be right once, security teams must be right every time. That's why it's critical for SOC teams to stop ransomware attackers from exploiting AD weaknesses.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.