Mind the Gap: How Existing Vulnerability Frameworks Can Leave an Organization Exposed
May 9, 2023This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this in...
Mind the Gap: A Closer Look at the Vulnerabilities Disclosed in 2022
May 9, 2023This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable can help.
Mind the Gap: A Closer Look at Eight Notable CVEs from 2022
May 9, 2023This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this inst...
What Security Leaders Need to Know About Security End of Life: How Tenable is Leading the Way
April 25, 2023Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers.
Tenable 2022 Threat Landscape Report: Reduce Your Exposure by Tackling Known Vulnerabilities
February 28, 2023Tenable’s annual analysis of the security and threat landscape offers guidance to help security professionals navigate the expanding attack surface.
You Can't Fix Everything: How to Take a Risk-Informed Approach to Vulnerability Remediation
January 17, 2023Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help.
Patch Tuesday’s Impact on Cybersecurity Over the Years
December 22, 2022Dive into the history of Patch Tuesday and learn how it continues to influence the ways security teams manage patches.
What Happens When the Metaverse Enters Your Attack Surface?
December 12, 2022Tenable polled 1,500 cybersecurity, IT and DevOps professionals about their top concerns in the nascent virtual reality worlds of the metaverse. Here's what we found out.
NETGEAR Router Misconfiguration Opens The Door For Remote Attacks
December 5, 2022Tenable Research has discovered a configuration issue impacting NETGEAR Nighthawk WiFi6 Routers commonly used in small offices and large homes. Organizations need to manually apply firmware updates.
Cloud Security Basics: Protecting Your Web Applications
November 29, 2022While cloud computing providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure offer robust and scalable services, securing your cloud environment brings its own unique challenges. You can reduce risk by addressing these eight common cloud security vulnerabilities and misconfigurations.
Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021
August 4, 2022International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. We identified vulnerabilities associated with these strains.
The Ransomware Ecosystem: In Pursuit of Fame and Fortune
July 28, 2022The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune.