Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

September 4, 2025

Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector

Compromised credentials are now the leading cause of cloud breaches, making identity your most critical attack surface. A new IDC white paper explores why this shift is happening and where traditional defenses fall short. Read on to learn how Tenable's identity-first approach turns this risk into your strongest defense.

August 26, 2025

Tenable Is a Leader in the IDC MarketScape: Worldwide Exposure Management 2025 Vendor Assessment

This recognition is about more than just our technology leadership — it reflects the real-world outcomes that the Tenable One Exposure Management Platform delivers.


August 25, 2025

How Exposure Management Has Helped Tenable Reduce Risk and Align with the Business

Tous les lundis, Tenable Exposure Management Academy vous donne des conseils pratiques et concrets pour passer de la gestion des vulnérabilités à la gestion de l'exposition. In the second of a two-part blog series, Tenable CSO Robert Huber shares how exposure management has helped him reduce risk and…


August 22, 2025

Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses

Check out the FBI’s alert on Russia-backed hackers infiltrating critical infrastructure networks via an old Cisco bug. Plus, MITRE dropped a revamped list of the most critical hardware security flaws. Meanwhile, NIST rolled out a battle plan against face-morphing deepfakes. And get the latest on…


August 18, 2025

How Tenable Moved From Siloed Security to Exposure Management

Tous les lundis, Tenable Exposure Management Academy vous donne des conseils pratiques et concrets pour passer de la gestion des vulnérabilités à la gestion de l'exposition. In the first of a two-part blog series, Tenable CSO Robert Huber shares how he and his team have guided the company to unified…


August 15, 2025

Cybersecurity Snapshot: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices

CISA stresses that an asset inventory is the foundation for OT security. Meanwhile, NIST has finalized cryptographic algorithms for resource-constrained devices. The agency is also developing control overlays for AI systems. Plus, a report reveals that security budget growth has slowed to a five…


August 14, 2025

How Tenable One Helps Canadian Orgs Set Up Exposure Management Programs and Meet Compliance Demands

The Tenable One Exposure Management Platform provides a single source of truth for cyber risk, helping Canadian security teams shift from reactive patching to proactive risk reduction. With native support for Canadian data residency and alignment with frameworks like ITSG-33, Tenable One helps…


August 13, 2025

CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection Vulnerability

Exploit code is reportedly available for a critical command injection vulnerability affecting Fortinet FortiSIEM devices.BackgroundOn August 12, Fortinet published a security advisory (FG-IR-25-152) for CVE-2025-25256, a critical command injection vulnerability affecting Fortinet FortiSIEM…


August 13, 2025

How to Remediate Risk to Critical OT/IoT Systems without Disrupting Operations

Find out how adopting a proactive approach to secure your operational environments can help you reduce risk and eliminate downtime.


August 12, 2025

Microsoft’s August 2025 Patch Tuesday Addresses 107 CVEs (CVE-2025-53779)

Microsoft addresses 107 CVEs, including one zero-day vulnerability that was publicly disclosed.


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >