How to Unlock Advanced IoT Visibility for Cyber-Physical Systems
As the number of IoT devices deployed globally continues to rise, cyber-physical systems and business operations are exposed to greater risk. Improving asset visibility, monitoring and risk management are critical steps to preventing breaches....
Strengthening the Nessus Software Supply Chain with SLSA
You know Tenable as a cybersecurity industry leader whose world-class exposure management products are trusted by our approximately 43,000 customers, including about 60% of the Fortune 500. But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cybe...
How Industry Partnerships Support Taking a Proactive, Preventive Approach to Cybersecurity
Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can benef...
Tenable One Exposure Management Platform: Unlocking the Power of Data
When our data engineering team was enlisted to work on Tenable One, we knew we needed a strong partner. Here’s how we selected Snowflake to help us deliver on the promise of exposure management....
Python NaN Injection
In Python, a NaN can cause a slew of errors leading to numerous failure conditions. Test for NaNs using a white-box scenario to avoid fallout. ...
An Introduction to “Scan Everything”
A “scan everything” approach tests and triages every asset to understand your organization’s risk and how to reduce risk quickly and efficiently. ...
10 Reasons Why Websites STILL Get Hacked
Even with all of the cybersecurity solutions on the market today, websites are still getting hacked by attackers. Find out how your organization could be exposed to hackers...
Do Not Take an IP-centric Approach to Attack Surface Mapping
Relying on IP data to identify assets means you're likely missing critical information needed to map your attack surface....
High-Fidelity Attack Surface Mapping
Eliminate blind spots and hinder attackers using these three tips to create a high-fidelity map of your organization’s entire attack surface....
NetFlow is the Wrong Way to Do Attack Surface Mapping
If your organization relies on NetFlow data for asset management, you're likely overlooking vital information to map your attack surface....
Static Lists Are The Wrong Way to Do Attack Surface Mapping
When identifying and cataloging assets, static lists leave your organization vulnerable to constant changes across your attack surface. ...
What Is VPR and How Is It Different from CVSS?
This blog series will provide an in-depth discussion of vulnerability priority rating (VPR) from a number of different perspectives. Part one will focus on the distinguishing characteristics of VPR that make it a more suitable tool for prioritizing remediation efforts than the Common Vulnerability S...