Beyond the Horizon: Top 5 Cloud Security Trends to Watch in 2024
Generative AI will undoubtedly boost organizations’ cybersecurity capabilities. However, cybersecurity departments will reap few gains from generative AI without first enforcing solid cloud security principles. In this blog, we explain the top cloud security trends that organizations must track – an...
Building Resilient OT Environments: Safeguards for Electric Utilities
Recent cyberattacks on critical infrastructure demonstrate how hackers can take advantage of industrial control systems. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....
Come appassionarsi agli audit e alla conformità: è possibile
Proteggere i carichi di lavoro in corso nel cloud pubblico e rispettare gli standard di conformità sono pilastri non negoziabili per la maggior parte delle aziende. Tuttavia, unire le necessarie funzionalità di visibilità, mappatura e monitoraggio è spesso un lungo processo manuale. As a result, audits and compliance exercises ...
Tenable Wrapped: A Look Back at Our Industry Recognition in 2023
Respected analyst firms and industry experts once again validated the exceptional quality, innovation and performance of Tenable products....
How to Tackle OT Challenges: Asset Inventory and Vulnerability Assessment
The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help....
AWS Access Analyzer Just Got Better, So Did Tenable Cloud Security
AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA) all...
Identità: il tessuto connettivo per la sicurezza nel cloud
Quasi tutto nel cloud è a rischio di esposizione a causa di un solo privilegio o una sola configurazione errata. Proper cloud posture and entitlement management can help mitigate risk and eliminate toxic combinations....
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads....
Study: Tenable Offers Fastest, Broadest Coverage of CISA's KEV Catalog
Tenable ranked first in multiple vulnerability management categories, including the most comprehensive coverage and quickest detection of CISA's Known Exploited Vulnerabilities, according to a Miercom report commissioned by Tenable....
CISA and NSA Release Top 10 Cybersecurity Misconfigurations: How Tenable Can Help
The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....
Sicurezza unificata per IT e applicazioni web: scansione delle applicazioni web on-premise integrata in Security Center
La scansione delle applicazioni web on-premise è ora disponibile all'interno di Tenable Security Center e offre una gestione completa dell'esposizione, con analisi accurate, copertura dei 10 principali rischi OWASP e una facile configurazione. Here’s what you need to know....
Empowering Cybersecurity Excellence: IBM and Tenable Collaborate for IT/OT Security Innovation
IBM and Tenable put IT/OT security on display at IBM's Watson Center in Munich with the QRadar and Tenable OT Security integration — showcasing industrial security, protection and asset management for joint customers and partners....