Strengthening Cyber Protections in the DoD's OT Systems
January 24, 2024Operational technology plays a major role in many aspects of the U.S. Department of Defense — including in military operations, in the infrastructure on bases and throughout the supply chain. Strengthening the cyber defenses of these systems is imperative. Here’s what you need to know.
Level Up Your Cloud Security Strategy
January 22, 2024Learn how to better your cloud security program with these ten security resolutions.
Tap Into Your Inner Logs for Better Anomaly Detection and Incident Response
January 19, 2024Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks.
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
January 18, 2024The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.
Beyond the Horizon: Top 5 Cloud Security Trends to Watch in 2024
January 16, 2024Generative AI will undoubtedly boost organizations’ cybersecurity capabilities. However, cybersecurity departments will reap few gains from generative AI without first enforcing solid cloud security principles. In this blog, we explain the top cloud security trends that organizations must track – and adapt to – this year in order to maintain a robust cloud security posture.
Building Resilient OT Environments: Safeguards for Electric Utilities
January 9, 2024Recent cyberattacks on critical infrastructure demonstrate how hackers can take advantage of industrial control systems. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage.
Learning to Love Audit and Compliance - It’s Possible
January 8, 2024Securing running workloads in the public cloud and meeting compliance standards are non-negotiable for most organizations. However, bringing together the necessary visibility, mapping and monitoring capabilities is often a manual, time-consuming process. As a result, audits and compliance exercises can cause delays and anxiety for security and compliance teams.
Tenable Wrapped: A Look Back at Our Industry Recognition in 2023
December 18, 2023Respected analyst firms and industry experts once again validated the exceptional quality, innovation and performance of Tenable products.
How to Tackle OT Challenges: Asset Inventory and Vulnerability Assessment
December 11, 2023The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help.
AWS Access Analyzer Just Got Better, So Did Tenable Cloud Security
November 27, 2023AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and ...
Identities: The Connective Tissue for Security in the Cloud
November 27, 2023Almost everything in the cloud is one excess privilege or misconfiguration away from exposure. Proper cloud posture and entitlement management can help mitigate risk and eliminate toxic combinations.
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
November 21, 2023CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads.