Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

February 24, 2025

Identity Is the New Battleground: Why Proactive Security Is the Way Forward

Protecting identities has become a top priority for security teams. However, many organizations remain exposed due to blind spots caused by identity sprawl and misplaced trust in identity providers. This blog explores why traditional security measures fall short, how AI-driven attackers are escalating identity threats, and why a proactive, identity-first approach is the only way forward.

January 17, 2023

You Can't Fix Everything: How to Take a Risk-Informed Approach to Vulnerability Remediation

Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help....


January 16, 2023

Tenable Cyber Watch: Top-In Demand Cyber Skills, Key Cloud Security Trends, Cyber Spending, and More

We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity.  It's Monday! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, the w...


January 16, 2023

Microsoft Azure Virtual Machines: Public IP Configuration Is Not Always As It Seems

If you’re not familiar enough with the SKU attribute of the Azure public IP address, you may think you’re configuring your virtual machines as public to the internet … but you aren’t....


January 13, 2023

Cybersecurity Snapshot: U.S. Gov’t Turns Up Heat on Breach Notifications, While Cyber Concerns Still Hamper Cloud Value

Learn all about the FCC’s plan to accelerate telecom breach reports. Plus, why cyber worries remain a cloud obstacle. Also, find out how to rate your cloud MSP’s cybersecurity strength. Then check out our ad-hoc poll on cloud security. And much more!...


January 12, 2023

Google: Monitor These Emerging Cloud Security Challenges in 2023

A new report from Google outlines a set of evolving threats that cloud security teams should keep an eye on in the new year....


January 10, 2023

Microsoft’s January 2023 Patch Tuesday Addresses 98 CVEs (CVE-2023-21674)

Microsoft addresses 98 CVEs including a zero-day vulnerability that was exploited in the wild....


January 9, 2023

Tenable Cyber Watch: Key 2022 Data for Cloud Security, VM, EASM, Web App Security, and More

It's that time again! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, the weekly video news digest that helps you zero-in on the things that matter right now in cybersecurity. As she does every Monday, Tenable Cyber Watch host Jirah Mickle...


January 8, 2023

Why JIT Access is an Essential Part of Cloud Security

Automating JIT in the cloud is win-win for improving security and business productivity -- and cracks a nut that PAM can’t....


January 6, 2023

Cybersecurity Snapshot: Discover the Most Valuable Cyber Skills, Key Cloud Security Trends and Cyber’s Big Business Impact

Happy New Year! Learn all about the cybersecurity expertise that employers value most; Google Cybersecurity Action Team’s latest take on cloud security trends; a Deloitte report on cybersecurity’s growing business influence; a growth forecast for cyber spending; and more!...


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >