Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Cybersecurity Snapshot: Find MITRE ATT&CK Complex? Need Help Mapping to It? There’s an App for That!

March 10, 2023

Learn about a new tool that streamlines MITRE ATT&CK mapping. Plus, known vulnerabilities remain a major cyber risk – just ask LastPass. Also, discover why SaaS data protection remains difficult. Plus, a look at the U.S. National Cybersecurity Strategy. And much more!

A New Incentive for Using AWS VPC Endpoints

March 9, 2023

If you haven’t been using VPC endpoints until now, AWS' two new condition keys should make you consider doing so.

What's New in Tenable OT Security: Superior IT/OT/IoT Asset Discovery, Advanced Threat Detection and More

March 9, 2023

Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk.

The Challenges of Multi-Cloud Compliance

March 9, 2023

Organizations that use public clouds like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) understand that each platform does things its own way, and those differences create challenges for securing them all. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenges and how Tenable Cloud Security can help. Check out the highlights of our discussion.

Managing Cloud Compliance and Security Posture with Cloud Compliance Tools

March 8, 2023

Why compliance and access security in the public cloud are so challenging – and how carefully-chosen CSPM tools can help.

Tenable Cyber Watch: Protecting Cyber Critical Infrastructure, Attackers Gain Upper Hand in Data Compromises, and more

March 6, 2023

This week’s edition of the Tenable Cyber Watch unpacks the challenges in protecting cyber critical infrastructure and addresses cyberthieves gaining the upper hand in data compromises. Also covered: Why organizations should brace themselves for more cyberattacks targeting accounting and financial data in 2023.

FBI and CISA Release Cybersecurity Advisory on Royal Ransomware Group

March 3, 2023

The FBI and CISA have released a joint Cybersecurity Advisory discussing the Royal ransomware group.

Cybersecurity Snapshot: A ChatGPT Special Edition About What Matters Most to Cyber Pros

March 3, 2023

Since ChatGPT’s release in November, the world has seemingly been on an “all day, every day” discussion about the generative AI chatbot’s impressive skills, evident limitations and potential to be used for good and evil. In this special edition, we highlight six things about ChatGPT that matter right now to cybersecurity practitioners.

Tenable 2022 Threat Landscape Report: Reduce Your Exposure by Tackling Known Vulnerabilities

February 28, 2023

Tenable’s annual analysis of the security and threat landscape offers guidance to help security professionals navigate the expanding attack surface.

Tenable Cyber Watch: N. Korea’s Ransomware Threats Target Hospitals, Romance Cyberscams Net Bad Guys $1.3B, Lessons Learned From The Phishing Attack Against Reddit

February 27, 2023

This week’s edition of the Tenable Cyber Watch unpacks just how much money romance cyberscams are costing Americans and addresses the U.S. government’s concerns about North Korea’s ransomware threats against hospitals. Also covered: Lessons learned from the phishing attack against social news site Reddit.

Cybersecurity Snapshot: Cyber Engineers and Architects Saw Salaries Spike in 2022

February 24, 2023

Find out how much of a pay bump cybersecurity architects and engineers got. Plus, a powerful AI cybersecurity tech is nearing prime time. Also check out the long-awaited security algorithms for IoT devices. Then dive into SaaS governance best practices. And much more!

Why Third-Party Tools Are Best for Multi-Cloud CSPM

February 23, 2023

Cloud security posture management enables organizations using multiple public cloud platforms like AWS, Azure and GCP to see everything they have running and where their security risks lie. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenges and how Tenable Cloud Security can help. Check out the highlights of our discussion.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.