Blogs Tenable
The hidden cost of AI speed: Unmanaged cyber risk
How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable
A complete and detailed operational technology (OT) asset inventory and taxonomy are not only the foundation of a defensible security posture, they’re also essential for resilient operations. Here’s a breakdown of CISA's latest OT guidance with details on how Tenable can help you turn it into…
Exploring the Exposure Management Maturity Model
Tous les lundis, Tenable Exposure Management Academy vous donne des conseils pratiques et concrets pour passer de la gestion des vulnérabilités à la gestion de l'exposition. In the first of a two-part blog series, Tenable’s Pierre Coyne guides you through the Tenable Exposure Management Maturity Model.
Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future
Check out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures!
Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale
Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an…
Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success
An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize actions and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re…
Nouveau rapport Tenable : en quoi la complexité des systèmes combinée à une faible sécurité de l'IA mettent en péril les environnements cloud
Cette étude, réalisée à la demande de Tenable et menée en collaboration avec la Cloud Security Alliance, met en avant les risques d'exposition des entreprises qui choisissent une stratégie d'adoption rapide du cloud et de l'IA, en combinaison avec des identités non sécurisées et une posture réactive. The report urges a strategic shift to preventive security with a…
Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)
Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.
Rompre les silos pour une vue du risque lié au cloud à l'échelle de l'écosystème
Une approche désordonnée de la sécurité du cloud génère des résultats parasites, qui empêchent d'y voir clair et rendent difficile la priorisation des problèmes à corriger. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform – giving you the context to pinpoint your…
Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials
Despite all the innovation in cloud computing, one persistent issue lurks in the shadows to undermine security hygiene - poor secrets management. Here, we explain compromised secrets’ impacts and causes and offer concrete risk-mitigation recommendations.