Tenable blog
Cybersecurity Snapshot: CISA Lists Security Features OT Products Should Have and Publishes AI Collaboration Playbook
Microsoft’s March 2023 Patch Tuesday Addresses 76 CVEs (CVE-2023-23397)
Microsoft addresses 76 CVEs including two zero-days exploited in the wild, one of which was publicly disclosed....
Tenable Cyber Watch: Tenable’s 2022 Threat Landscape Report, Top Cyber Risks for 2023, and A Salary Boost for Cyber Architects and Engineers
This week’s edition of Tenable Cyber Watch unpacks the top eight cybersecurity risks organizations face in 2023. Plus, we talk about the continued threat of unpatched, known vulnerabilities that are still being exploited by threat actors. Finally, we look at a new study that shows salaries are incre...
Cybersecurity Snapshot: Find MITRE ATT&CK Complex? Need Help Mapping to It? There’s an App for That!
Learn about a new tool that streamlines MITRE ATT&CK mapping. Plus, known vulnerabilities remain a major cyber risk – just ask LastPass. Also, discover why SaaS data protection remains difficult. Plus, a look at the U.S. National Cybersecurity Strategy. And much more!...
A New Incentive for Using AWS VPC Endpoints
If you haven’t been using VPC endpoints until now, AWS' two new condition keys should make you consider doing so....
What's New in Tenable OT Security: Superior IT/OT/IoT Asset Discovery, Advanced Threat Detection and More
Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk....
The Challenges of Multi-Cloud Compliance
Organizations that use public clouds like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) understand that each platform does things its own way, and those differences create challenges for securing them all. In a recent episode of the Tenable Cloud Security Coffee Break we...
Managing Cloud Compliance and Security Posture with Cloud Compliance Tools
Why compliance and access security in the public cloud are so challenging – and how carefully-chosen CSPM tools can help....
Tenable Cyber Watch: Protecting Cyber Critical Infrastructure, Attackers Gain Upper Hand in Data Compromises, and more
This week’s edition of the Tenable Cyber Watch unpacks the challenges in protecting cyber critical infrastructure and addresses cyberthieves gaining the upper hand in data compromises. Also covered: Why organizations should brace themselves for more cyberattacks targeting accounting and financial da...
FBI and CISA Release Cybersecurity Advisory on Royal Ransomware Group
The FBI and CISA have released a joint Cybersecurity Advisory discussing the Royal ransomware group....