Tenable blog
Cybersecurity Snapshot: CSA Offers Tips for Deploying AI Securely, While Deloitte Says Cyber Teams’ GenAI Use Yields Top ROI
Cybersecurity Snapshot: RSA Conference Special Edition with All-You-Can-Eat AI and ChatGPT
Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!...
IDC Ranks Tenable No. 1 in Worldwide Device Vulnerability Management Market Share for the Fourth Consecutive Year
The research firm's latest report also provides market insights security professionals can use to improve their vulnerability management strategy....
How to Improve Kubernetes Security: Four Best Practices to Implement Today
How to ensure the right configurations and policies are in place to keep your cloud environments secure....
What Security Leaders Need to Know About Security End of Life: How Tenable is Leading the Way
Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers....
‘K’ is for ‘Komplex’: Key Kubernetes Considerations for Security Teams
The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s w...
Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume
How to do CWP right to prepare your organization and protect it from the next widespread vulnerability. ...
Tenable Cyber Watch: Dark Web Marketplace Genesis Market Shut Down, How Using ChatGPT Can Breach Data Privacy Rules, and more
This week’s edition of the Tenable Cyber Watch unpacks the international sting operation that successfully shut down notorious cybercrime marketplace Genesis Market and explores how using ChatGPT can breach data privacy rules. Also covered: Why the cybersecurity term “BISO” is getting all the buzz. ...
ETHOS: Bringing the OT Security Community Together for Threat Information Sharing
Tenable participates in a first-of-its-kind initiative that will aggregate information from several operational technology (OT) security vendors to share emerging threat intelligence with critical infrastructure service providers....
CVE-2023-20864: VMware Aria Operations for Logs Deserialization Vulnerability
VMware issues advisory to address two flaws in its VMware Aria Operations for Logs solution, including a critical deserialization flaw assigned a CVSSv3 score of 9.8....