Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

August 1, 2025

Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

July 29, 2025

Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats....


July 29, 2025

Identity is the New Perimeter: Why Your IdP Isn’t Enough

In a cloud-first world, identity is one of the most critical layers of security. While organizations are making progress using IdPs, major identity protection gaps remain....


July 28, 2025

Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market

Tenable customers have spoken: Here’s what they’re saying about our products....


July 28, 2025

The Keys to Implementing Exposure Management

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on hesitations around exposure management. ...


July 25, 2025

Cybersecurity Snapshot: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan

Check out the latest on attackers’ cyber siege of SharePoint servers. Plus, the White House releases plan to spur AI innovation. In addition, CISA alerts orgs about Interlock ransomware. And get the latest on Q2's top malware; ransomware trends; and credentialed scanning....


July 24, 2025

Adopter une approche plus ciblée : les améliorations apportées à Tenable VPR et ce qui le distingue des autres modèles de priorisation

Tenable a récemment apporté un certain nombre d'améliorations au classement VPR (Vulnerability Priority Rating), notamment une threat intelligence enrichie, des informations et des explications optimisées par l'IA, ainsi que des métadonnées contextuelles. Learn how the improved prioritization effectiveness of the enhanced VPR compares to other common prioritiz...


July 23, 2025

Tackling Shadow AI in Cloud Workloads

As enterprise adoption of cloud AI systems balloons, protecting them has become a priority for cybersecurity teams. Shadow AI – the rampant, unsanctioned use of AI apps and services – has emerged as a particularly critical threat. Here we outline two best practices that can help you combat shadow AI...


July 21, 2025

Forrester désigne Tenable comme l'un des leaders du marché dans le rapport « Unified Vulnerability Management Solutions Wave™, Q3 2025 »

“Tenable continues to extend its established vulnerability management offerings into exposure management with its Tenable One platform,” according to the report....


July 21, 2025

How Exposure Management Can Turn a Torrent of Data into Insight

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on the greatest cybersecurity challenges....


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >