Tenable blog
Agentic AI Security: Keep Your Cyber Hygiene Failures from Becoming a Global Breach
From Brittle to Scalable: AWS Boosts VPC Perimeter Security with New IAM Keys
AWS has released three new IAM condition keys for VPC endpoints to strictly limit access by specific accounts, organizational units, or AWS Organizations. Learn how these keys help you build scalable security perimeters and reduce manual policy maintenance.
A Practical Defense Against AI-led Attacks
The era of AI-driven cyberattacks is here, demonstrated by the recent abuse of an agentic AI tool in a broad espionage campaign. Defense requires a new approach centered on preemptive exposure management, combining reinforced security fundamentals with defining the new AI attack surface and…
Cybersecurity Snapshot: What Security Pros’ Are Saying About Exposure Management, Risk Prioritization, Tool Sprawl and More
Want to take a peek at your fellow cybersecurity practitioners’ thoughts on topics such as exposure response, patch management, and security tool sprawl? In case you missed them, we’re revisiting some of our most insightful webinar polls of 2025. Check out what your peers had to say!
Navigating Australian Cybersecurity Regulations for Critical Infrastructure Operators
Australia's critical infrastructure leaders must master a complex array of regulations and frameworks, including the SOCI Act, SLACI Act, and AESCSF. The requirements call for board-level compliance, incident reporting, and bolstering OT cyber resilience against rising geopolitical threats.
What You Can't See Can Hurt You: Are Your Security Tools Hiding the Real Risks?
With disconnected tools creating critical blind spots, your security stack is likely hiding more risk than it exposes. Discover how unifying your security data into a single view uncovers the full risk picture and lets you focus on what matters most.
FAQ About Sha1-Hulud 2.0: The "Second Coming" of the npm Supply-Chain Campaign
Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to immediately audit for at least 800 compromised packages.
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Cyber agencies call on ISPs to help combat "bulletproof" internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections.
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
Context is key for protecting data in the cloud. Learn how an integrated CNAPP approach moves beyond basic DSPM and takes into account identities, misconfigurations, and AI workloads to pinpoint the greatest risks to your cloud data.
Stop Patching Panic: Ditch Slow Manual Patching and Embrace Intelligent Automation
Fear of a bad patch causing downtime is justified, but manual patching leaves your organization exposed. See how Tenable Patch Management provides autonomy with customizable rules and guardrails, allowing you to rapidly remediate critical vulnerabilities without risking business disruption.