You’ve Migrated Business-Critical Functions to the Cloud…Now What?
April 20, 2022An expanding attack surface demands a robust cybersecurity strategy. Here’s what you need to know.
Microsoft’s April 2022 Patch Tuesday Addresses 117 CVEs (CVE-2022-24521)
April 12, 2022Microsoft’s April 2022 Patch Tuesday Addresses 117 CVEs (CVE-2022-24521) Microsoft addresses 117 CVEs in its April 2022 Patch Tuesday release, including two zero-day vulnerabilities, one of whi...
How to Operationalize a Cloud Security Solution
April 11, 2022How to successfully operationalize your cloud security solution in 4 easy steps — and why fast and effective operationalization matters.
VMware Patches Multiple Vulnerabilities in Workspace ONE, Identity and Lifecycle Manager and vRealize (VMSA-2022-0011)
April 7, 2022VMware cautions organizations to patch or mitigate several serious vulnerabilities across multiple products.
Securing Critical Infrastructure: It's Complicated
April 5, 2022In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can help.
Spring4Shell (CVE-2022-22965) FAQ: Spring Framework Remote Code Execution Vulnerability
March 30, 2022A list of frequently asked questions related to Spring4Shell (CVE-2022-22965).
CVE-2022-22948: VMware vCenter Server Sensitive Information Disclosure Vulnerability
March 30, 2022Researchers disclose a moderate severity vulnerability in VMware vCenter Server that can be used in an exploit chain with other vCenter Server flaws to take over servers.
Cr8escape: How Tenable Can Help (CVE-2022-0811)
March 29, 2022CrowdStrike discloses container escape vulnerability affecting CRI-O for Kubernetes. Here’s how Tenable.cs can help you detect vulnerable pods. Background On March 15, CrowdStrike published tech...
ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware – How Tenable Can Help
March 24, 2022Private messages between Conti members uncover invaluable information about how the infamous ransomware group hijacks victims’ systems. Leaked internal chats between Conti ransomware group members ...
Access Undenied on AWS
March 20, 2022Introducing our new open-source tool: Access Undenied on AWS. The tool parses AWS AccessDenied CloudTrail events, explains the reasons for them and offers actionable fixes.
Behind the Scenes: How We Picked 2021’s Top Vulnerabilities – and What We Left Out
March 11, 2022The 2021 Threat Landscape Retrospective explored the top five vulnerabilities of the year. Learn about other high-impact vulnerabilities that nearly made our list. When putting together the Threat ...
The GCP Shared Responsibility Model: Everything You Need to Know
March 8, 2022Do you know what your organization is accountable for under the Google Cloud Platform shared responsibility model?