Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blogs Tenable

July 1, 2025

États-Unis, House Homeland Security Appropriations Bill Seeks to Modernize Border Infrastructure Security with Proactive OT/IT Security Measures

The FY 2026 House Homeland Security Appropriations Bill highlights growing focus in Congress on protecting border infrastructure from cyber threats. The directive to implement continuous monitoring and real-time threat intelligence reflects a broader push toward modern, preventive cybersecurity across federal agencies.

February 24, 2023

Cybersecurity Snapshot: Cyber Engineers and Architects Saw Salaries Spike in 2022

Find out how much of a pay bump cybersecurity architects and engineers got. Plus, a powerful AI cybersecurity tech is nearing prime time. Also check out the long-awaited security algorithms for IoT devices. Then dive into SaaS governance best practices. And much more!...


February 23, 2023

Why Third-Party Tools Are Best for Multi-Cloud CSPM

Cloud security posture management enables organizations using multiple public cloud platforms like AWS, Azure and GCP to see everything they have running and where their security risks lie. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenge...


February 17, 2023

World Economic Forum Names Cybercrime and Cyber Insecurity Among Top 10 Global Risks for 2023

Business and cyber leaders polled by WEF worry that geopolitical unrest will trigger a “catastrophic cyberattack” in the next two years. Here’s what you need to know. ...


February 17, 2023

Cybersecurity Snapshot: If Recession Hits, Infosec Teams Expected to Suffer the Fewest Job Losses

Find out why a study says cybersecurity pros will weather staff reductions better than all other employees. Plus, AI abuse concerns heat up as users jailbreak ChatGPT. Also, learn all about the ransomware threat from North Korea aimed at hospitals. Then check out how the Reddit breach has put phishi...


February 16, 2023

South Korean and American Agencies Release Joint Advisory on North Korean Ransomware

Several South Korean and American agencies have released a joint cybersecurity advisory on North Korean state-sponsored ransomware operators....


February 16, 2023

How Industry Partnerships Support Taking a Proactive, Preventive Approach to Cybersecurity

Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can benef...


February 14, 2023

Microsoft’s February 2023 Patch Tuesday Addresses 75 CVEs (CVE-2023-23376)

Microsoft addresses 75 CVEs including three zero-day vulnerabilities that were exploited in the wild....


February 14, 2023

Navigating Federal Cybersecurity Recommendations for Public Water Utilities: How Tenable Can Help

Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and how...


February 13, 2023

Cyber Watch: A Peek Inside NIST’s AI Risk Framework, Protecting Employees from Scams, How to Talk to Your Business Counterparts, and more

Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for protecting your employees from money-transfer scams.  Learning to secure AI? Curious to know how ...


Des actualités utiles sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.

Coup d’œil sur l'écosystème des ransomwares

Téléchargez le rapport >