Blogs Tenable
Secrets dévoilés : les expositions de données dans le cloud qui mettent votre business en danger

CISOs Tell All: Everything You’ve Ever Wanted To Know About CISOs in 2022
You’ve got questions and they’ve got answers. A global survey provides a snapshot of what it’s like to sit in the CISO chair, as these cybersecurity leaders face increasingly sophisticated cyber threats and heightened expectations from their organizations. They're questions that most cybers...
Tenable.io: To control or not to control, that is the question
For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to im...
Top 20 CVEs Exploited by People's Republic of China State-Sponsored Actors (AA22-279A)
CISA, the NSA and FBI issue a joint advisory detailing the top 20 vulnerabilities exploited by state-sponsored threat actors linked to the People’s Republic of China....
CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy
Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access....
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Not great | New malware cracks monthly top 10 list | And much more!...
Public Network Access to Azure Resources Is Too Easy to Configure
For some types of Microsoft Azure resources and subnets, it’s extremely easy to configure what is essentially public network access. We describe here some examples and how to reduce such risks....
Présentation de Tenable One, la plateforme de gestion de l'exposition
Anticipez les attaques potentielles. Réduisez votre exposition de façon proactive. Communicate with your key stakeholders....
Gestion de l'exposition : réduire le risque sur la surface d'attaque moderne
Les entreprises de cyber-sécurité sont aux prises avec des programmes de sécurité réactifs et cloisonnés, ainsi qu'une multitude d'outils ponctuels qui génèrent des lots de données fragmentées mais peu d'informations. Here we explain why they need an exposure management platform that provides comprehensive visibility and allows them to anticipate...
CVE-2022-41040 and CVE-2022-41082: ProxyShell Variant Exploited in the Wild
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available....