How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines
Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how....
Modifiche ai nomi dei prodotti Tenable e l'evoluzione del brand Tenable
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. ...
The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...
L'integrazione di Tenable Security Center in Tenable One offre una gestione completa dell'esposizione per i clienti on-premise
Con l'integrazione di Tenable Security Center in Tenable One, Tenable diventa l'unico fornitore a offrire la gestione dell'esposizione sia per i modelli di distribuzione on-premise che ibridi. Here’s what you need to know. ...
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
Gli utenti di Tenable Cloud Security ora possono connettere rapidamente i propri account cloud di Azure per operazioni di gestione della postura di sicurezza del cloud, inclusa la scansione di vulnerabilità della sicurezza, configurazioni errate e conformità.Here’s how....
Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...
Agents vs. Agentless: Which Solution Is Right for Your Public Cloud Environment?
You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report finding...
TSA, FAA Requirements Emphasize Cybersecurity for Airport and Aircraft Operators and Airport Terminal Projects: How Tenable Can Help
The TSA and FAA are making cybersecurity a priority for airport and aircraft operators and for airport terminal projects to prevent disruption and degradation to their infrastructure. Here's what you need to know — and how Tenable can help....
Cinque principi fondamentali per la sicurezza del cloud ibrido
How to build a hybrid-cloud security strategy that is effective, scalable and affordable. ...
Gestione dell'esposizione: 7 vantaggi di un approccio su piattaforma
Quando si tratta di sicurezza informatica preventiva, per lungo tempo si è discusso se sia più efficace gestire una serie di soluzioni all'avanguardia mirate o adottare un approccio su piattaforma più consolidato. Here are seven reasons an exposure management platform can help reduce cyber risk....
EPA Issues Cybersecurity Regulations for Public Water Systems: How Tenable Can Help
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....
What's New in Tenable OT Security: Superior IT/OT/IoT Asset Discovery, Advanced Threat Detection and More
Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk....