Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

January 23, 2025

CVE-2025-23006: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day Reportedly Exploited

A zero-day vulnerability in SonicWall’s Secure Mobile Access (SMA) 1000 was reportedly exploited in the wild according to researchers.

October 19, 2022

Three U.S. Policy Recommendations to Strengthen OT Cybersecurity

A presidential advisory committee report outlined strategies to improve government asset visibility, procurement and information sharing to enhance operational technology (OT) cybersecurity practices....


October 19, 2022

IAM Role Trust Update – What You Need to Know

When it comes to assuming roles, AWS is changing an aspect of how trust policy is evaluated; here is a quick digest of what this change may mean to you....


October 18, 2022

How Tenable Helps Federal Agencies Meet CISA’s Binding Operational Directive 23-01

Here’s how to leverage Tenable solutions to achieve compliance with BOD 23-01 from the Cybersecurity and Infrastructure Security Agency (CISA)....


October 14, 2022

Cybersecurity Snapshot: 6 Things That Matter Right Now

Topics that are top of mind for the week ending Oct. 14 | DevOps team culture is key for supply chain security | SecOps gets more challenging as attack surface expands | Weak credentials hurt cloud security | Incident responders grapple with stress | Security spending grows | And much more!...


October 13, 2022

Consolidate and Unify to Accelerate Your Security Efforts

CISOs want to shrink their cybersecurity tool stack and see improved interoperability among products so that they can draw actionable insights from uniform and normalized data. Here we explain why this is key for understanding your environment’s security posture and empowering you to make better dec...


October 12, 2022

Verizon’s 2022 Data Breach Report – Insights for Cloud Security Professionals

Wondering which cyberattack trends are putting your organization at risk? Learn about the leading threat vectors — and how cloud security solutions can help....


October 11, 2022

Microsoft’s October 2022 Patch Tuesday Addresses 84 CVEs (CVE-2022-41033)

Microsoft addresses 84 CVEs in its October 2022 Patch Tuesday release, including 13 critical flaws....


October 11, 2022

CISOs Tell All: Everything You’ve Ever Wanted To Know About CISOs in 2022

You’ve got questions and they’ve got answers. A global survey provides a snapshot of what it’s like to sit in the CISO chair, as these cybersecurity leaders face increasingly sophisticated cyber threats and heightened expectations from their organizations.  They're questions that most cybers...


October 10, 2022

Tenable.io: To control or not to control, that is the question

For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to im...


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

A Look Inside the Ransomware Ecosystem

Download the Report >