Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

February 24, 2025

Identity Is the New Battleground: Why Proactive Security Is the Way Forward

Protecting identities has become a top priority for security teams. However, many organizations remain exposed due to blind spots caused by identity sprawl and misplaced trust in identity providers. This blog explores why traditional security measures fall short, how AI-driven attackers are escalating identity threats, and why a proactive, identity-first approach is the only way forward.

May 9, 2023

Mind the Gap: How Existing Vulnerability Frameworks Can Leave an Organization Exposed

This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and dis...


May 9, 2023

Mind the Gap: A Closer Look at the Vulnerabilities Disclosed in 2022

This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable ca...


May 9, 2023

Mind the Gap: A Closer Look at Eight Notable CVEs from 2022

This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss how...


May 8, 2023

Tenable Cyber Watch: Nearly 50% of Workers Have Accessed Ex-Employers’ Accounts, Biden Seeks Your Input on AI Accountability, and more

This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have ...


May 5, 2023

Cybersecurity Snapshot: CSA Offers Guidance on How To Use ChatGPT Securely in Your Org

Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. And much more! ...


May 4, 2023

Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad

Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions....


May 3, 2023

Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure

Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how....


May 2, 2023

Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach

Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...


May 1, 2023

Tenable Cyber Watch: 3 Hot Takes from RSA Conference, Samsung Employees Leak Sensitive Data to ChatGPT, and more

This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry. ...


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >