Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

October 10, 2025

Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find

Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.

March 1, 2024

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. Et bien plus encore !


February 29, 2024

Comment sécuriser tous vos assets (IT, OT et IoT) avec une plateforme de gestion de l'exposition

Les équipes de sécurité de l'entreprise sont confrontées à de sérieux obstacles pour défendre leur infrastructure OT/IoT critique, notamment en raison d'une visibilité fragmentée, d'un manque d'anticipation des risques et de données cloisonnées.Discover how purpose-built solutions for OT/IoT exposure management can help organizations enhance visibility, prioritize…


February 23, 2024

Cybersecurity Snapshot: LockBit Gang Gets Knocked Down, as CISA Stresses Security of Water Plants

Check out how cyber agencies from multiple countries hit the LockBit ransomware group. Meanwhile, CISA wants water treatment plants to button up their cyber defenses. Plus, there’s a new generative AI governance checklist for tech and business leaders. And the White House seeks to boost ports'…


February 22, 2024

IDC classe Tenable n° 1 en termes de part de marché mondiale dans le domaine de la gestion des vulnérabilités des appareils pour la cinquième année consécutive

Le dernier rapport de la société d'étude fournit également des informations sur le marché dont les professionnels de la sécurité peuvent tirer parti pour améliorer leur stratégie de gestion des vulnérabilités.


February 21, 2024

Protecting DoD Building Management Systems with Advanced OT Security

The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are designed to improve the monitoring and maintenance of these systems, but they also create new…


February 20, 2024

Frequently Asked Questions about ScreenConnect Vulnerabilities

Frequently asked questions about two vulnerabilities affecting ConnectWise ScreenConnect


February 20, 2024

Managed Kubernetes: Is It Right for My Organization?

As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your Kubernetes clusters? And should your organization host its Kubernetes deployments or instead choose a…


February 16, 2024

Cybersecurity Snapshot: ChatGPT Gets So-So Grade in Code Analysis Test, while JCDC Pledges To Focus on Protecting Critical Infrastructure

Check out why ChatGPT’s code analysis skills left Carnegie Mellon researchers unimpressed. Plus, JCDC will put special focus on critical infrastructure security in 2024. Meanwhile, CISA and OpenSSF shine a spotlight on the security of software package repositories. And scammers leveraged tech tools…


February 14, 2024

Pig Butchering Scam: From Tinder and TikTok to WhatsApp and Telegram, How Scammers Are Stealing Millions in a Long Con

In part one of a two-part series on Pig butchering, we detail the pervasive scam that has impacted thousands of victims around the world, resulting in the loss of hundreds of millions of dollars. This blog highlights the who and the how of Pig butchering scams, and details the Pig butchering…


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >

× Contactez notre équipe commerciale