Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

January 23, 2025

CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers.

February 17, 2023

Cybersecurity Snapshot: If Recession Hits, Infosec Teams Expected to Suffer the Fewest Job Losses

Find out why a study says cybersecurity pros will weather staff reductions better than all other employees. Plus, AI abuse concerns heat up as users jailbreak ChatGPT. Also, learn all about the ransomware threat from North Korea aimed at hospitals. Then check out how the Reddit breach has put phishi...


February 16, 2023

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware

Several South Korean and American agencies have released a joint cybersecurity advisory on North Korean state-sponsored ransomware operators....


February 16, 2023

How Industry Partnerships Support Taking a Proactive, Preventive Approach to Cybersecurity

Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can benef...


February 14, 2023

Microsoft’s February 2023 Patch Tuesday Addresses 75 CVEs (CVE-2023-23376)

Microsoft addresses 75 CVEs including three zero-day vulnerabilities that were exploited in the wild....


February 14, 2023

Navigating Federal Cybersecurity Recommendations for Public Water Utilities: How Tenable Can Help

Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and how...


February 13, 2023

Cyber Watch: A Peek Inside NIST’s AI Risk Framework, Protecting Employees from Scams, How to Talk to Your Business Counterparts, and more

Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for protecting your employees from money-transfer scams.  Learning to secure AI? Curious to know how ...


February 10, 2023

Cybersecurity Snapshot: Check Out Our No-Holds-Barred Interview with ChatGPT

We pulled no punches in our question-and-answer session with ChatGPT: Find out what the world’s most famous AI chatbot had to say. Plus, CISA and the FBI offer help in dealing with a massive ransomware campaign. Also, are CIOs becoming de-facto CISOs? And cyber attackers are aiming at finance and ac...


February 8, 2023

How to Implement CIEM – A Checklist

What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out....


February 8, 2023

How to Extract Data and Value from Tenable’s EASM Solution

It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data....


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >