Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

October 7, 2025

Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep

Cloud security teams are often blind to one of the biggest threats to cloud environments: a web of over-privileged identities that create pathways for attackers. Learn how to regain control of your cloud identities by automating the enforcement of least privilege across your environment.

January 19, 2024

Tap Into Your Inner Logs for Better Anomaly Detection and Incident Response

Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks.


January 18, 2024

Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions

The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.


January 17, 2024

Oracle January 2024 Critical Patch Update Addresses 191 CVEs

Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates.


January 16, 2024

CVE-2023-6548, CVE-2023-6549: Zero-Day Vulnerabilities Exploited in Citrix NetScaler ADC and NetScaler Gateway

Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws.


January 16, 2024

Au-delà de l'horizon : le top 5 des tendances en sécurité du cloud à suivre en 2024

L'IA générative va indubitablement améliorer les capacités de cyber-sécurité des entreprises. Toutefois, les services de cyber-sécurité n'y gagneront pas grand-chose s'ils n'appliquent pas au préalable de solides principes de sécurité du cloud. In this blog, we explain the top cloud security trends that organizations must track –…


January 12, 2024

Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks

Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and…


January 10, 2024

CVE-2023-46805, CVE-2024-21887: Zero-Day Vulnerabilities Exploited in Ivanti Connect Secure and Policy Secure Gateways

Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors.


January 9, 2024

Microsoft’s January 2024 Patch Tuesday Addresses 48 CVEs (CVE-2024-20674)

Microsoft addresses 48 CVEs in its January 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.


January 9, 2024

Créer des environnements OT résilients : une garantie pour les fournisseurs d'électricité

Les récentes cyber-attaques sur des infrastructures critiques ont démontré à quel point les hackers étaient capables de tirer parti des systèmes de contrôles industriels. Les entreprises qui adoptent les dernières bonnes pratiques en matière de gestion des vulnérabilités seront les mieux préparées pour réduire leur risque et atténuer d'évetuels dommages.


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >

× Contactez notre équipe commerciale