Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

September 4, 2025

Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector

Compromised credentials are now the leading cause of cloud breaches, making identity your most critical attack surface. A new IDC white paper explores why this shift is happening and where traditional defenses fall short. Read on to learn how Tenable's identity-first approach turns this risk into your strongest defense.

March 12, 2024

What’s in Store This Year for Tenable Partners? A Lot of Growth, Including 25,000 Trees!

Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our partners.


March 11, 2024

Comment sécuriser tous vos assets IT, OT et IoT avec une plateforme de gestion de l'exposition : l'importance d'une priorisation contextualisée

Découvrez comment la priorisation contextuelle de l'exposition transforme la sécurité OT/IoT. Les entreprises peuvent désormais appliquer une prévention des failles proactive et non plus simplement réactive.


March 8, 2024

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And…


March 6, 2024

CVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in JetBrains TeamCity

Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution.


March 1, 2024

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. Et bien plus encore !


February 29, 2024

Comment sécuriser tous vos assets (IT, OT et IoT) avec une plateforme de gestion de l'exposition

Les équipes de sécurité de l'entreprise sont confrontées à de sérieux obstacles pour défendre leur infrastructure OT/IoT critique, notamment en raison d'une visibilité fragmentée, d'un manque d'anticipation des risques et de données cloisonnées.Discover how purpose-built solutions for OT/IoT exposure management can help organizations enhance visibility, prioritize…


February 23, 2024

Cybersecurity Snapshot: LockBit Gang Gets Knocked Down, as CISA Stresses Security of Water Plants

Check out how cyber agencies from multiple countries hit the LockBit ransomware group. Meanwhile, CISA wants water treatment plants to button up their cyber defenses. Plus, there’s a new generative AI governance checklist for tech and business leaders. And the White House seeks to boost ports'…


February 22, 2024

IDC classe Tenable n° 1 en termes de part de marché mondiale dans le domaine de la gestion des vulnérabilités des appareils pour la cinquième année consécutive

Le dernier rapport de la société d'étude fournit également des informations sur le marché dont les professionnels de la sécurité peuvent tirer parti pour améliorer leur stratégie de gestion des vulnérabilités.


February 21, 2024

Protecting DoD Building Management Systems with Advanced OT Security

The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are designed to improve the monitoring and maintenance of these systems, but they also create new…


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >