Tap Into Your Inner Logs for Better Anomaly Detection and Incident Response
Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks....
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....
Beyond the Horizon: Top 5 Cloud Security Trends to Watch in 2024
Generative AI will undoubtedly boost organizations’ cybersecurity capabilities. However, cybersecurity departments will reap few gains from generative AI without first enforcing solid cloud security principles. In this blog, we explain the top cloud security trends that organizations must track – an...
Building Resilient OT Environments: Safeguards for Electric Utilities
Recent cyberattacks on critical infrastructure demonstrate how hackers can take advantage of industrial control systems. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....
Learning to Love Audit and Compliance - It’s Possible
Securing running workloads in the public cloud and meeting compliance standards are non-negotiable for most organizations. However, bringing together the necessary visibility, mapping and monitoring capabilities is often a manual, time-consuming process. As a result, audits and compliance exercises ...
Tenable Wrapped: A Look Back at Our Industry Recognition in 2023
Respected analyst firms and industry experts once again validated the exceptional quality, innovation and performance of Tenable products....
How to Tackle OT Challenges: Asset Inventory and Vulnerability Assessment
The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help....
AWS Access Analyzer Just Got Better, So Did Tenable Cloud Security
AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA) all...
Identities: The Connective Tissue for Security in the Cloud
Almost everything in the cloud is one excess privilege or misconfiguration away from exposure. Proper cloud posture and entitlement management can help mitigate risk and eliminate toxic combinations....
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads....
Study: Tenable Offers Fastest, Broadest Coverage of CISA's KEV Catalog
Tenable ranked first in multiple vulnerability management categories, including the most comprehensive coverage and quickest detection of CISA's Known Exploited Vulnerabilities, according to a Miercom report commissioned by Tenable....
CISA and NSA Release Top 10 Cybersecurity Misconfigurations: How Tenable Can Help
The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....