Blogs Tenable
Why Security and IT Disagree on Patching (and Why That's a Good Thing)
What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience
Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows and gain deeper visibility across workloads,…
How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk
Wondering what your peers think of exposure management? New reports from the Exposure Management Leadership Council, a CISO working group sponsored by Tenable, offer insights.
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future — discover what ‘good’ looks like and how to get there.
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381
Tenable Research recently discovered that the original patch for a critical vulnerability affecting BentoML could be bypassed. In this blog, we explain in detail how we discovered this patch bypass in this widely used open source tool. The vulnerability is now fully patched.
La fin des angles morts, ou comment obtenir une visibilité complète sur le SDLC dans un monde multicloud
Vous êtes aux prises avec un environnement multicloud désordonné ? Découvrez comment l'approche unifiée de la sécurité du cloud de Tenable vous permet d'éliminer les angles morts dangereux, d'atteindre une visibilité et un contrôle complets, et de sécuriser vos assets depuis la première ligne de code jusqu'à la production finale.
IDC Ranks Tenable #1 in WW Device Vulnerability and Exposure Management Market Share
Tenable’s market share leadership in Worldwide Device Vulnerability and Exposure Management is a testament to the trust tens of thousands of customers place in Tenable One every day. Our placement also marks seven consecutive years at #1.
How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable
A complete and detailed operational technology (OT) asset inventory and taxonomy are not only the foundation of a defensible security posture, they’re also essential for resilient operations. Here’s a breakdown of CISA's latest OT guidance with details on how Tenable can help you turn it into…
Exploring the Exposure Management Maturity Model
Tous les lundis, Tenable Exposure Management Academy vous donne des conseils pratiques et concrets pour passer de la gestion des vulnérabilités à la gestion de l'exposition. In the first of a two-part blog series, Tenable’s Pierre Coyne guides you through the Tenable Exposure Management Maturity Model.
Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future
Check out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures!