Terrascan Joins the Nessus Community, Enabling Nessus To Validate Modern Cloud Infrastructures
The addition of Terrascan to the Nessus family of products helps users better secure cloud native infrastructure by identifying misconfigurations, security weaknesses, and policy violations by scanning Infrastructure as Code repositories.
Identity Access Management in Google Cloud Platform (GCP IAM): What Security Pros Need to Know
An introduction to GCP’s RBAC mechanism for permission assignments — and how to apply the principles of least privilege to keep your organization secure.
Tenable.io Achieves StateRAMP Authorization as Part of Our Commitment to Protect State and Local Governments
StateRAMP-authorized cloud solutions like Tenable.io meet stringent security and compliance standards.
Locate Tenable Compliance Templates Faster with Revamped Portal
Following a portal relaunch, Tenable’s Audit Files are now easier to find and manage, thanks to a new search engine that supports a variety of search query criteria.
3 Ways Security Leaders Can Work With DevOps to Build a Culture of Security
Learn how your organization can boost security efforts by eliminating the disconnect between Security and DevOps teams. Establishing a strong security culture that bridges the gap between DevOps and security is one of the greatest challenges that CISOs and other security leaders face. Because…
Announcing the 2022 Tenable Assure Partner Award Winners
Celebrating the elite defenders who are helping organizations around the world reduce their cyber risk. Cybersecurity is always a team effort. Day in, day out, defenders rely on an ecosystem of teams, partners and vendors to address the evolving threat landscape and deliver holistic security. …
Microsoft’s May 2022 Patch Tuesday Addresses 73 CVEs (CVE-2022-26925)
Microsoft addresses 73 CVEs in its May 2022 Patch Tuesday release, including two zero-day vulnerabilities, one of which was exploited in the wild.
The Era of Responsible Cybersecurity Finally Arrives
The SEC’s proposed rule on cybersecurity promotes transparency and encourages free market forces.
CVE-2022-1388 : Authentication Bypass in F5 BIG-IP
CVE-2022-1388 : Authentication Bypass in F5 BIG-IP F5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution. This vulnerability is actively being exploited. Update May 10: The Identifying Affected Systems section now…
Gérer et remédier aux vulnérabilités dues aux mauvaises configurations du cloud grâce à Tenable.cs et HashiCorp Terraform Cloud
Les intrusions dans le cloud connaissent un véritable rebond en raison de mauvaises configurations qui pourraient être évitées. Voici comment atténuer les risques grâce à une nouvelle intégration entre Tenable.cs et Terraform Cloud.
Comment choisir un outil de CSPM moderne pour réduire le risque dans votre infrastructure cloud
Les solutions de gestion de la posture de sécurité dans le cloud (CSPM) sont devenues un must dans la détection et la correction des défauts de configuration des clouds publics, du code au runtime.
IDC Ranks Tenable Number One in Worldwide Device Vulnerability Management Market Share for 2020
Le dernier rapport de la société d'étude fournit également des informations sur le marché dont les professionnels de la sécurité peuvent tirer parti pour améliorer leur stratégie de gestion des vulnérabilités.