Tenable blog
Salt Typhoon: An Analysis of Vulnerabilities Exploited by this State-Sponsored Actor
How People, Process and Technology Challenges Are Hurting Cybersecurity Teams
In a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, we set out to understand the real-world challenges standing in the way of effective risk-reduction practices. Here’s what we learned. ...
Tenable Cyber Watch: IAM Ranks No. 1 as Most In-Demand Cyber Tech Skill; Anti-Phishing Best Practices, and more
This week's edition of Tenable Cyber Watch unpacks the most sought-after cyber skills and addresses how to protect your organization from phishing attacks. Also covered: The most common method used to log into online accounts. ...
CVE-2023-46747: Critical Authentication Bypass Vulnerability in F5 BIG-IP
A critical authentication bypass vulnerability in F5’s BIG-IP could allow remote, unauthenticated attackers to execute system commands. Organizations are encouraged to apply patches as soon as possible....
Cybersecurity Snapshot: GenAI Drives Broader Use of Artificial Intelligence Tech for Cyber
Check out how organizations’ enthusiasm over generative AI is fueling artificial intelligence adoption for cybersecurity. Plus, how CISA plans to revamp the U.S. government’s cyber incident response plan. In addition, learn about a new set of best practices for protecting cloud backups. Also, why bo...
Study: Tenable Offers Fastest, Broadest Coverage of CISA's KEV Catalog
Tenable ranked first in multiple vulnerability management categories, including the most comprehensive coverage and quickest detection of CISA's Known Exploited Vulnerabilities, according to a Miercom report commissioned by Tenable....
Tenable Cyber Watch: U.S., Japan Warn Of Chinese ‘BlackTech’ Attackers, CISA Unveils New HBOM Framework, and more
This week’s edition of Tenable Cyber Watch unpacks BlackTech, the hackers linked to the Chinese government who are stealthily compromising network devices. We also cover two CISA initiatives: A new HBOM framework for hardware supply chain risk and an updated reference architecture for identity secur...
Cybersecurity Snapshot: Cyber Teams Adopt GenAI, Integrated Suites To Boost Defenses
Cyber leaders are embracing generative AI and product suites, while ditching siloed tools. Plus, check out a guide packed with anti-phishing tips, and another one full of IAM security best practices. Also, discover the skills that cybersecurity recruiters value the most. And much more!...
CISA and NSA Release Top 10 Cybersecurity Misconfigurations: How Tenable Can Help
The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....
Oracle October 2023 Critical Patch Update Addresses 176 CVEs
Oracle addresses 176 CVEs in its fourth quarterly update of 2023 with 387 patches, including 46 critical updates....