Tenable Cyber Watch: GenAI Drives AI Adoption for Cybersecurity, Ransomware Attacks Double in Q3, and more
This week’s edition of Tenable Cyber Watch unpacks how generative AI is driving AI adoption for cybersecurity and addresses why board directors are becoming more confident in their organization’s cybersecurity. Also covered: Ransomware attacks almost doubled in Q3. ...
Cybersecurity Snapshot: Why Organizations Struggle to Prevent Attacks and How They Can Do Better
Find out the top people, process and technology challenges hurting cybersecurity teams identified in a commissioned study by Forrester Consulting on behalf of Tenable....
Cyber Watch: Tenable CSO Bob Huber on Common Employee Behaviors That Can Put Your Company At Risk
On this special edition of Tenable Cyber Watch, Tenable CSO Bob Huber discusses whether certain common employee behaviors are security risks for a company - red flags 🔴 or green flags 🟢. ...
Tenable Cyber Watch: IAM Ranks No. 1 as Most In-Demand Cyber Tech Skill; Anti-Phishing Best Practices, and more
This week's edition of Tenable Cyber Watch unpacks the most sought-after cyber skills and addresses how to protect your organization from phishing attacks. Also covered: The most common method used to log into online accounts. ...
Cybersecurity Snapshot: GenAI Drives Broader Use of Artificial Intelligence Tech for Cyber
Check out how organizations’ enthusiasm over generative AI is fueling artificial intelligence adoption for cybersecurity. Plus, how CISA plans to revamp the U.S. government’s cyber incident response plan. In addition, learn about a new set of best practices for protecting cloud backups. Also, why bo...
Tenable Cyber Watch: U.S., Japan Warn Of Chinese ‘BlackTech’ Attackers, CISA Unveils New HBOM Framework, and more
This week’s edition of Tenable Cyber Watch unpacks BlackTech, the hackers linked to the Chinese government who are stealthily compromising network devices. We also cover two CISA initiatives: A new HBOM framework for hardware supply chain risk and an updated reference architecture for identity secur...
Cybersecurity Snapshot: Cyber Teams Adopt GenAI, Integrated Suites To Boost Defenses
Cyber leaders are embracing generative AI and product suites, while ditching siloed tools. Plus, check out a guide packed with anti-phishing tips, and another one full of IAM security best practices. Also, discover the skills that cybersecurity recruiters value the most. And much more!...
CISA and NSA Release Top 10 Cybersecurity Misconfigurations: How Tenable Can Help
The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....
Tenable Cyber Watch: SANS Advises on Maximizing OT Security Budgets; Cybersecurity Awareness Month, and more
This week’s edition of Tenable Cyber Watch unpacks how to maximize shrinking OT security budgets and addresses why CISA is calling on tech vendors to do better as a part of its cybersecurity awareness campaign. Also covered: Ermetic’s new open source tool that helps you assess multi-cloud security. ...
Cybersecurity Snapshot: SANS Offers Tips for Maximizing Smaller OT Security Budgets
A SANS Institute survey found that budgets for ICS/OT security have shrunk, and advises on how to do more with less. Plus, hiring managers boost starting salaries to recruit stellar cyber pros. In addition, CISA’s Cybersecurity Awareness Month campaign challenges tech vendors to build safer products...
How to Meet FY 2023 U.S. State and Local Cybersecurity Grant Program Objectives
This is the first of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP. In 2021, the U.S. Infrastructure Investment and Jobs Act created the State and Local Cybersecurity Grant Program (SLCGP) to he...
New U.S. SLCGP Cybersecurity Plan Requirement: Adopt Cybersecurity Best Practices Using CISA's CPGs
This is the second of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP....