Cybersecurity Snapshot: 6 Things That Matter Right Now
August 5, 2022Topics that are top of mind for the week ending Aug. 5 | Don’t take your eye off the Log4j ball. The dangers of unsupported software. Why low MFA adoption is everyone’s problem. Preventing ransomware attacks. And much more!
Cybersecurity Snapshot: 6 Things That Matter Right Now
July 29, 2022Topics that are top of mind for the week ending July 29 | Boost your security awareness program. Why fire drills hurt security teams. A quick temperature check on attack surface management. Protecting smart factories from cyberattacks. And much more!
NSTAC Aces Zero Trust Recommendations for Protecting Government Entities
July 22, 2022Kudos to the National Security Telecommunications Advisory Committee for its report on boosting zero trust and ID management. As the Biden administration looks to implement its recommendations, a strong focus on vulnerability management would optimize opportunities for success.
Cybersecurity Snapshot: 6 Things That Matter Right Now
July 15, 2022Topics that are top of mind for the week ending July 15 | Government cybersecurity efforts tripped by technical debt. Neglect SaaS security at your own risk. A ranking of the most dangerous software weaknesses. Lessons learned about critical infrastructure security. And much more!
Cybersecurity Snapshot: 6 Things That Matter Right Now
July 1, 2022Topics that are top of mind for the week ending July 1 | Cybersecurity budgeting priorities. All you ever wanted to know about ransomware. CISOs weigh best-of-breed vs. platforms. The epidemic of identity-related breaches. And much more!
Cybersecurity Snapshot: 6 Things That Matter Right Now
June 17, 2022Key vulnerabilities you can’t ignore. Best practices to improve operational technology (OT) cybersecurity. A reality check on shift left, DevSecOps and cloud security. Tackling the security skills gap. Healthcare data breaches. And much more!
Tenable Capture the Flag 2022: The Results Are In!
June 16, 2022It’s time to crown the winners of this year’s Capture the Flag Event! This event presented a series of security-related challenges in a Jeopardy-style format. Challenges ranged in difficulty and to...
How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens
June 1, 2022A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants, fuel pipelines, water treatment plants and similar facilities?
How State and Local Governments Can Bolster their Cyber Defenses
May 24, 2022Cybersecurity leaders of U.S. cities and states must protect their systems and data from nation-state attackers, including Russian hackers.
A Practical Approach for Shifting Left
May 23, 2022Learn how you can adopt a shift left approach that boosts the security of your software releases by helping DevOps teams detect and fix vulnerabilities and misconfigurations early in your software development lifecycle.
The State of OT Security, a Year Since Colonial Pipeline
May 19, 2022During a recent podcast, Tenable's VP of Operational Technology Marty Edwards discussed the cyber threats faced by critical infrastructure providers and the importance of OT security, topics he'll add...
Mind the (Communication) Gap: How Security Leaders Can Become Dev and Ops Whisperers
May 17, 2022Developers, Ops and DevOps teams must incorporate security into their processes – often a hard sell. Here’s how security leaders can successfully align with them to weave security into their tools and workflows.