Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

October 8, 2025

Exposure Management Beyond The Endpoint

Relying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does.

April 10, 2025

Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications

The emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some security concerns. In this blog we address FAQs about…


April 9, 2025

Stronger Cloud Security in Five: The Importance of Cloud Configuration Security

Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management.


April 8, 2025

Il Patch Tuesday di aprile 2025 di Microsoft risolve 121 CVE (CVE-2025-29824)

Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild.


April 8, 2025

How To Implement Just-In-Time Access: best practice e lezioni apprese

With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, we’ll share how we implemented JIT access internally at Tenable…


April 7, 2025

Come passare alla gestione dell'esposizione in cinque mosse

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we explore the five steps to take on your journey to exposure management.


April 4, 2025

Cybersecurity Snapshot: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods

Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security practices. In addition, CISA and other cyber agencies warn that attackers are using “fast flux” techniques to conceal their…


April 3, 2025

How To Harden GitLab Permissions with Tenable

If your organization uses GitLab for managing your software development lifecycle, you must ensure you’re not misconfiguring the permissions of this open source DevSecOps platform. Doing so can expose your source code, along with sensitive data, while creating security risks. In this blog, we’ll…


April 1, 2025

ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run

Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions but that have edit permissions on Google Cloud Run revisions. The vulnerability could have…


March 31, 2025

Cybersecurity Leaders Share Three Challenges Exposure Management Helps Them Solve

Ogni lunedì, la Tenable Exposure Management Academy fornisce consigli pratici e basati sulla realtà per passare dalla gestione delle vulnerabilità alla gestione dell'esposizione. In this blog, we share three challenges cybersecurity leaders say exposure management helps them solve.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.

Uno sguardo all'interno dell'ecosistema dei ransomware

Scarica il report >

× Contatta il team di vendita