How Exposure Management Can Make Pen Testing More Effective
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
Un modo pratico per ridurre i rischi nel reparto produzione
Si parla molto di sicurezza informatica per il reparto produzione, da dove è meglio iniziare? Cerchiamo di non complicare le cose e soffermiamoci sulle motivazioni degli aggressori e su cosa possiamo fare per fermarli. Si tratta di ridurre i rischi e ottimizzare il proprio impegno per ottenere i risultati migliori. Read on to learn…
Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development
With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of…
How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines
Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.
Modifiche ai nomi dei prodotti Tenable e l'evoluzione del brand Tenable
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer.
The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how…
L'integrazione di Tenable Security Center in Tenable One offre una gestione completa dell'esposizione per i clienti on-premise
Con l'integrazione di Tenable Security Center in Tenable One, Tenable diventa l'unico fornitore a offrire la gestione dell'esposizione sia per i modelli di distribuzione on-premise che ibridi. Ecco cosa devi sapere
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.
Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…
Agents vs. Agentless: Which Solution Is Right for Your Public Cloud Environment?
You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report…
TSA, FAA Requirements Emphasize Cybersecurity for Airport and Aircraft Operators and Airport Terminal Projects: How Tenable Can Help
The TSA and FAA are making cybersecurity a priority for airport and aircraft operators and for airport terminal projects to prevent disruption and degradation to their infrastructure. Here's what you need to know — and how Tenable can help.
Cinque principi fondamentali per la sicurezza del cloud ibrido
Come definire una strategia di sicurezza per il cloud ibrido che sia efficace, scalabile e conveniente.