Bringing External Attack Surface Management to the Masses with Bit Discovery
External Attack Surface Management (EASM) is an essential foundation of cybersecurity best practices. Soon, you’ll be able to take advantage of automated attack surface discovery in Tenable products....
Comment responsabiliser votre SOC face aux problèmes d'identité et optimiser ses compétences
Alors qu'un attaquant n'a besoin que d'une seule occasion, les équipes de sécurité n'ont jamais le droit à l'erreur. That's why it's critical for SOC teams to stop ransomware attackers from exploiting AD weaknesses....
Terrascan Joins the Nessus Community, Enabling Nessus To Validate Modern Cloud Infrastructures
The addition of Terrascan to the Nessus family of products helps users better secure cloud native infrastructure by identifying misconfigurations, security weaknesses, and policy violations by scanning Infrastructure as Code repositories. ...
Locate Tenable Compliance Templates Faster with Revamped Portal
Following a portal relaunch, Tenable’s Audit Files are now easier to find and manage, thanks to a new search engine that supports a variety of search query criteria....
Gérer et remédier aux vulnérabilités dues aux mauvaises configurations du cloud grâce à Tenable.cs et HashiCorp Terraform Cloud
Les intrusions dans le cloud connaissent un véritable rebond en raison de mauvaises configurations qui pourraient être évitées. Here’s how you can lower your risk with a new integration between Tenable.cs and Terraform Cloud....
Tenable Lance une suite de nouvelles fonctions produit pour offrir une sécurité cloud-native complète tout au long du cycle de vie
Les nouvelles fonctions produit de Tenable.cs sont conçues pour assurer l'agilité des entreprises tout en réduisant les risques. A suite of upgrades to Tenable.cs, our cloud-native application protection platform, are designed to enable organizations to secure cloud resources, container images and cloud assets to ...
Assess Log4Shell Like an Attacker With Tenable’s Dynamic Detections
Defenders need to pull out all the stops when it comes to Log4Shell. Tenable provides dynamic remote Log4Shell vulnerability detections to incorporate the attacker’s perspective of your organization....
Présentation de Tenable.cs : cycle de vie complet, sécurité cloud native
The new offering extends the recently acquired Accurics platform to enable DevSecOps and “shift left security” with integrated controls for development and runtime workflows, focused on Infrastructure as Code (IaC)....
Sécurisation des environnements IT-OT : les défis rencontrés par les professionnels de la sécurité IT
When providing cybersecurity in converged IT and operational technology environments, it’s critical for infosec pros to understand the differences between the two and utilize a toolset that delivers a comprehensive picture of both in a single view....
CISA Directive 22-01: How Tenable Can Help You Find and Fix Known Exploited Vulnerabilities
While U.S. federal agencies are required to remediate the vulnerabilities outlined in the U.S. Cybersecurity and Infrastructure Security Agency's Binding Operational Directive 22-01, any organization would do well to consider prioritizing these flaws as part of their risk-based vulnerability managem...
How to Choose an OT Cybersecurity Solution Vendor
Hint: choose a leader in ICS security....
Nessus 10.0: Vulnerability Assessment for Today’s Dynamic Environments
New features are designed to offer the portability, efficiency and ease-of-use needed to protect the ever-expanding attack surface....