Blogs Tenable
Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days

CVE-2025-20333, CVE-2025-20362: Frequently Asked Questions About Zero-Day Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) Vulnerabilities
Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign.
How to Future-Proof Your Cybersecurity Spend
A recent study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable reveals that complexity is driving a growing number of organizations to increase their exposure management budgets. Here are 5 considerations to help make the most of your investments.
Whole-of-State Cybersecurity: Uniting SLED Agencies for Maximum Impact
In my work at Tenable, I’ve had the opportunity to meet with many CIOs, CISOs and executives nationwide. I’ve seen firsthand how successful whole-of-state efforts can solve three key challenges and help agencies reduce their cyber risk.
Service Accounts in Active Directory: These OG NHIs Could Be Your Weakest Link
While non-human identities (NHIs) in cloud and SaaS operations may be getting lots of attention lately, securing your Active Directory service accounts can go a long way in reducing risk. Here are three steps you can take right now.
Defusing Cloud Misconfiguration Risk: Finding and Fixing Hidden Cloud Security Flaws
Seemingly innocuous cloud configuration errors can create massive security risks, especially if your teams are siloed and your security tools don’t play well with each other. Find out how a unified, proactive security approach provides the visibility and automation needed to find and fix these…
Cybersecurity Snapshot: Cyber Platforms Are CISOs' BFFs, Study Says, as OpenSSF Warns that AI Coding Tools Need Adult Supervision
Check out why CISOs are embracing security platforms to reduce tool sprawl. Plus, learn how to prompt AI developer assistants so that they generate secure code. Further, dig into CISA’s analysis of malware tied to Ivanti EPMM vulnerabilities. And get the latest on external attack surface management…
What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience
Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows and gain deeper visibility across workloads,…
How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk
Wondering what your peers think of exposure management? New reports from the Exposure Management Leadership Council, a CISO working group sponsored by Tenable, offer insights.
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future — discover what ‘good’ looks like and how to get there.