OT Maritime Security: Stormy Waters or Smooth Sailing Ahead?
June 29, 2023The maritime industry is navigating a sea of change when it comes to cybersecurity. The interconnected vessels and new technologies enabling the shipping world to become more efficient also introduce cyber risk. Here's what you need to know about the challenges and risks these floating cities face — and how Tenable can help.
How Exposure Management Can Make Pen Testing More Effective
June 28, 2023Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
A Practical Way To Reduce Risk on the Shop Floor
June 27, 2023There is a lot of noise on cybersecurity for the manufacturing shop floor, but where do you start? Let’s keep it simple and touch on why attackers do what they do, and what you can do to stop them. It’s all about reducing risk and maximizing your efforts to get the best results. Read on to learn more about the threat landscape and some tactics to manage the threats.
Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development
May 24, 2023With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of Microsoft customers.
How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines
May 23, 2023Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.
Tenable Product Name Changes and the Evolution of the Tenable Brand
May 15, 2023Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer.
The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable
May 11, 2023Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you can implement it today.
Tenable Security Center Integration into Tenable One Delivers Full Exposure Management for On-Prem Customers
May 9, 2023With the integration of Tenable Security Center into Tenable One, Tenable becomes the only vendor to offer exposure management for both on-premises and hybrid deployment models. Here’s what you need to know.
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
May 3, 2023Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.
Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach
May 2, 2023Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved threat visibility, cyber hygiene and incident response. Read on to learn more about the benefits of a whole-of-state approach.
Agents vs. Agentless: Which Solution Is Right for Your Public Cloud Environment?
April 12, 2023You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report findings, but there are tradeoffs. In a recent episode of the Tenable Cloud Security Coffee Break series, we talked about each approach, the appropriate use cases and how Tenable Cloud Security can help.
TSA, FAA Requirements Emphasize Cybersecurity for Airport and Aircraft Operators and Airport Terminal Projects: How Tenable Can Help
April 11, 2023The TSA and FAA are making cybersecurity a priority for airport and aircraft operators and for airport terminal projects to prevent disruption and degradation to their infrastructure. Here's what you need to know — and how Tenable can help.