Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

August 7, 2024

Securing the AI Attack Surface: Separating the Unknown from the Well Understood

There's a lot of confusion and unknowns regarding AI application risks, and a lot of vendors are trying to offer solutions to problems that aren't clearly defined. In this blog we explain why a smart approach is to start by focusing on basic, foundational cyber hygiene, adopt well-established best p...


August 6, 2024

Do You Think You Have No AI Exposures? Think Again

As AI usage becomes more prevalent in organizations globally, security teams must get full visibility into these applications. La première étape consiste à mettre en place un inventaire complet des applications basées sur l'IA.Read on to learn what we found about AI application-usage in the real world when w...


August 6, 2024

Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach

As AI transforms industries, security remains critical. Discover the importance of a security-first approach in AI development, the risks of open-source tools, and how Tenable's solutions can help protect your systems....


August 5, 2024

Your Exposure Ends Here: Introducing the New Tenable Brand

At Tenable, our mission is to manage and reduce cyber risk, because cyber risk is business risk. Feedback from dozens of top CISOs is reflected in our latest brand evolution. Tenable is the exposure management company that helps customers know where their weaknesses lie, expose their risk and close ...


August 5, 2024

Changer les données en action avec une gestion des vulnérabilités axée sur le renseignement

La priorisation des vulnérabilités en contexte a toujours constitué un véritable défi pour les équipes de gestion des vulnérabilités, et cette tâche n'est pas prête de s'arranger car le nombre de CVE publiées ne cesse d'augmenter. To remedy this, many enterprises are forced to invest in products and services to protect their environments with various ...


August 2, 2024

Cybersecurity Snapshot: Data Breach Costs Rise, as Ransomware Attacks Fall, Reports Find

IBM’s latest “Cost of a Data Breach Report” finds these data-theft incidents getting more expensive. Plus, the IT-ISAC says that ransomware attacks fell in Q2 due to law-enforcement disruptions of ransomware groups. Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI system securi...


July 31, 2024

Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization

As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help....


July 30, 2024

Le score EPSS s'avère performant pour prédire les exploits, comme l'indique l'étude de Cyentia et FIRST

Tenable sponsored research from Cyentia and FIRST, which finds that while vulnerability exploitation is highly variable, EPSS is getting stronger in its ability to predict exploitation. ...


July 26, 2024

Cybersecurity Snapshot: North Korea’s Cyber Spies Hunt for Nuclear Secrets, as Online Criminals Ramp Up AI Use in the EU

Check out a CISA-FBI advisory about North Korean cyber espionage on critical infrastructure orgs. Plus, what Europol found about the use of AI for cybercrime. Meanwhile, the risk concerns that healthcare leaders have about generative AI. And a poll on water plant cybersecurity. And much more!...


July 24, 2024

ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions

Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs ...


July 23, 2024

Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design

With the unprecedented tech outages experienced by so many of our customers over the last week, we recognize the need for deeper understanding of our software development processes and how they support global business continuity. In this blog post, we’ll outline how Tenable’s comprehensive approach ...


July 23, 2024

If You Only Have Five Minutes, Here’s CNAPP in a Snap (But We Have an Ebook, Too)

Si vous vous demandez pourquoi tout ce buzz autour des plateformes CNAPP de protection des applications cloud natives, ne vous en faite pas. Our new eBook “Empower Your Cloud: Mastering CNAPP Security” explains in plain English what CNAPP is, how it works and why it’ll help you secure your cloud environment confidently. Read o...


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Faille Apache Log4j : les applications tierces sous le feu des projecteurs

En savoir plus >