Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

May 23, 2023

How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines

Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how....


May 22, 2023

Tenable Cyber Watch: Protecting Quantum Computers from Cyberattacks, AI Vulnerability Management, and more

This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors. ...


May 19, 2023

Cybersecurity Snapshot: As OpenAI Honcho Hits Capitol Hill, Regulatory Storm Clouds Form Over AI La La Land

Check out what OpenAI’s CEO told lawmakers in Congress about regulating AI. Meanwhile, an upcoming EU law could cramp ChatGPT’s style. Also, the public’s nail biting over AI is real. In addition, a new AI chatbot may soon answer your burning questions about the dark web. And much more!...


May 18, 2023

U.S. and Australian Agencies Publish Joint Cybersecurity Advisory on BianLian Ransomware Group

The FBI, ACSC and CISA have released a joint cybersecurity advisory discussing the BianLian ransomware group....


May 15, 2023

Changement des noms de produit Tenable et évolution de la marque Tenable

Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. ...


May 15, 2023

Tenable Cyber Watch: White House Unveils $140M Investment for Responsible AI, Top 5 Malware in Q1 2023, and more

This week’s edition of the Tenable Cyber Watch unpacks the White House’s $140 million dollar investment into AI research and development and explores the security implications of ChatGPT. Also covered: The top 5 malware strains for Q1 2023. ...


May 12, 2023

Cybersecurity Snapshot: How To Boost Customers' Trust in Your Digital Services

Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. And much more!...


May 11, 2023

The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable

Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...


May 9, 2023

Microsoft’s May 2023 Patch Tuesday Addresses 38 CVEs (CVE-2023-29336)

Microsoft addresses 38 CVEs including three zero-day vulnerabilities, two of which were exploited in the wild....


May 9, 2023

L'intégration de Tenable Security Center dans Tenable One offre une gestion de l'exposition complète pour les clients sur site

Avec l'intégration de Tenable Security Center dans Tenable One, Tenable devient le seul fournisseur à offrir la gestion de l'exposition pour les modèles de déploiement hybrides et sur site. Here’s what you need to know. ...


May 9, 2023

Mind the Gap: How Waiting for NVD Puts Your Organization at Risk

This is the first of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. We explore the impact of that gap on an organization’s cyber risk and discuss how Tenable can help....


May 9, 2023

Mind the Gap: How Existing Vulnerability Frameworks Can Leave an Organization Exposed

This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and dis...


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Faille Apache Log4j : les applications tierces sous le feu des projecteurs

En savoir plus >