Tenable blog
What Makes This “Data Privacy Day” Different?
Visibility of the Unknown: Understanding EASM and How It Can Help
External attack surface management (EASM) is difficult and oftentimes confusing, especially in a world of poor inventory controls and a growing attack surface. This blog discusses what's required to do EASM successfully....
Tenable Cyber Watch: What Do Our Experts Predict for 2023?
Banish the post-holiday blues with news you can use: this week's episode of Tenable Cyber Watch takes a look at four cybersecurity trends to watch for 2023. Learn how extortion tactics will reshape ransomware, OT security, SaaS worries and protecting the cloud are top of mind for our experts....
Cybersecurity Snapshot: Key 2022 Data for Cloud Security, Vulnerability Management, EASM, Web App Security and More
As 2022 ends, we highlight important data points that shine a light on the trends, challenges and best practices that matter to cybersecurity leaders eager to boost their exposure management and reduce their organizations’ cyber risk. ...
CVE-2022-47939: Critical RCE Vulnerability in Linux Kernel
A critical remote code execution vulnerability in the Linux kernel has been publicly disclosed by Trend Micro's Zero Day Initiative in its ZDI-22-1690 advisory. The vulnerability has been given a CVSSv3 of 10.0. There are no reports of active exploitation....
Cybersecurity Snapshot: Six Predictions from Tenable for 2023
As 2022 draws to a close, we asked Tenable experts what they expect for the new year. After reading the tea leaves, they’re forecasting developments in extortion attacks, OT security, SaaS threats, metaverse risks and more!...
Patch Tuesday’s Impact on Cybersecurity Over the Years
Dive into the history of Patch Tuesday and learn how it continues to influence the ways security teams manage patches....
CVE-2022-37958: FAQ for Critical Microsoft SPNEGO NEGOEX Vulnerability
Microsoft recently reclassified a vulnerability in SPNEGO NEGOEX, originally patched in September, after a security researcher discovered that it can lead to remote code execution. Organizations are urged to apply these patches as soon as possible....
Cloud Native Application Protection Platform (CNAPP): An Evolving Approach to Cloud Security
A look at how IAM works and how CIEM enhances IAM security in the cloud....
Your Guide to IAM – and IAM Security in the Cloud
A look at how IAM works and how CIEM enhances IAM security in the cloud....