Cybersecurity Snapshot: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang
January 5, 2024Want to learn more about protecting AI systems from malicious actors? A new NIST guide aims to help you identify and mitigate attacks targeting AI tools. Plus, new granular configuration recommendations for securing Microsoft 365 are out. In addition, the cost of cyber incidents is rising. And there’s a new decryption tool for victims of the ALPHV/Blackcat ranswomare. And much more!
$18.2 Million Funding Available for Tribal Government Cybersecurity
January 3, 2024The Tribal Cybersecurity Grant Program (TCGP) is accepting applications through January 10, making $18.2 million in federal grant funding available to eligible tribes to reduce cyber risk.
Tenable OT Security: 2023 Year in Review
December 29, 2023As we reflect on the many accomplishments Tenable OT Security achieved in 2023, one thing is clear: we couldn’t have done it without the support and collaboration of our customers and partners.
Cybersecurity Snapshot: What’s in Store for 2024 in Cyberland? Check Out Tenable Experts’ Predictions for OT Security, AI, Cloud Security, IAM and more
December 29, 2023The new year is upon us, and so we ponder the question: What cybersecurity trends will shape 2024? To find out, we asked Tenable experts to read the tea leaves. Their 2024 forecasts include: A bigger security role for cloud architects; a focus by ransomware gangs on OT systems in critical industries; an intensification of IAM attacks; and much more!
Tenable Cyber Watch: See What Tenable Experts Predict for Cybersecurity in 2024
December 27, 2023This week's edition of Tenable Cyber Watch unpacks 2024 predictions for cloud security and operational technology. Also covered: the Tenable's Research team's cybersecurity predictions for 2024. ...
Cyber Watch: Cloud Security Tops CISO Worries, Securing Your Cloud Apps and Data, and more
December 25, 2023This week's edition of Tenable Cyber Watch unpacks the top cybersecurity concerns for CISOs and shares tips on how you can better secure your cloud apps and data. Also covered: Cloud adoption by financial institutions spiked in 2023.
Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more
December 22, 2023As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security.
Tenable Wrapped: A Look Back at Our Industry Recognition in 2023
December 18, 2023Respected analyst firms and industry experts once again validated the exceptional quality, innovation and performance of Tenable products.
Tenable Cyber Watch: Promoting AI Safety and Security, White House AI Cyber Challenge, and more
December 18, 2023This week’s edition of Tenable Cyber Watch unpacks why CISA urged AI vendors to apply secure by design practices to software products and takes a look back at some of the initiatives launched this past year to promote the safety and responsible use of AI. Also covered: How you could win millions in the White House AI Cyber Challenge?
Trends that Could Shape OT Security in 2024
December 15, 2023Discover the transformative shifts reshaping Operational Technology (OT) security in an evolving threat landscape.
Cybersecurity Snapshot: Want to Deploy AI Securely? New Industry Group Will Compile AI Safety Best Practices
December 15, 2023A group that includes the Cloud Security Alliance, CISA and Google is working to compile a comprehensive collection of best practices for secure AI use. Meanwhile, check out a draft of secure configuration recommendations for the Google Workspace suite. Plus, MITRE plans to release a threat model for embedded devices used in critical infrastructure. And much more!
The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data
December 13, 2023Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control.