Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

December 5, 2025

Cybersecurity Snapshot: Fending Off BRICKSTORM Malware Data-Theft Attacks and Integrating AI into OT Securely

CISA has identified a China-backed BRICKSTORM malware campaign targeting the IT and government sectors. Meanwhile, global agencies released a guide for adding AI safely to OT. Plus, proving your online content is legit; fighting cyber fraud; and preventing bank account takeover scams.

September 16, 2025

Niente più punti ciechi: ottieni la visibilità completa dell'SDLC in un mondo multi-cloud

Hai difficoltà a gestire un ambiente multi-cloud disordinato? Scopri in che modo l'approccio unificato alla sicurezza del cloud di Tenable ti aiuta a eliminare pericolosi punti ciechi, a ottenere visibilità e controllo completi e a proteggere i tuoi asset dalla prima riga di codice alla produzione completa.


September 16, 2025

IDC Ranks Tenable #1 in WW Device Vulnerability and Exposure Management Market Share

Tenable’s market share leadership in Worldwide Device Vulnerability and Exposure Management is a testament to the trust tens of thousands of customers place in Tenable One every day. Our placement also marks seven consecutive years at #1.


September 15, 2025

How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable

A complete and detailed operational technology (OT) asset inventory and taxonomy are not only the foundation of a defensible security posture, they’re also essential for resilient operations. Here’s a breakdown of CISA's latest OT guidance with details on how Tenable can help you turn it into…


September 15, 2025

Exploring the Exposure Management Maturity Model

Ogni lunedì, la Tenable Exposure Management Academy fornisce consigli pratici e basati sulla realtà per passare dalla gestione delle vulnerabilità alla gestione dell'esposizione. In the first of a two-part blog series, Tenable’s Pierre Coyne guides you through the Tenable Exposure Management Maturity Model.


September 12, 2025

Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future

Check out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures!


September 11, 2025

Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale

Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an…


September 10, 2025

Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success

An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize actions and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re…


September 10, 2025

New Tenable Report: How Complexity and Weak AI Security Put Cloud Environments at Risk

This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…


September 9, 2025

Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)

Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.

Uno sguardo all'interno dell'ecosistema dei ransomware

Scarica il report >

× Contatta il team di vendita