Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

April 27, 2026

As the NVD scales back CVE enrichment, here’s what Tenable customers need to know

NIST’s shift toward selective CVE enrichment creates significant visibility gaps for teams relying solely on the National Vulnerability Database. As AI accelerates vulnerability disclosure rates, organizations need independent, high-fidelity intelligence to prioritize risks that the NVD may now overlook.

February 14, 2023

Navigating Federal Cybersecurity Recommendations for Public Water Utilities: How Tenable Can Help

Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and…


February 13, 2023

Cyber Watch: Uno sguardo all'AI Risk Framework del NIST, protezione dei dipendenti dalle truffe, come parlare con le controparti aziendali e tanto altro ancora

Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for protecting your employees from money-transfer scams.  Learning to secure AI? Curious to know how…


February 10, 2023

Cybersecurity Snapshot: Dai un'occhiata alla nostra intervista senza esclusione di colpi con ChatGPT

We pulled no punches in our question-and-answer session with ChatGPT: Find out what the world’s most famous AI chatbot had to say. Plus, CISA and the FBI offer help in dealing with a massive ransomware campaign. Also, are CIOs becoming de-facto CISOs? And cyber attackers are aiming at finance and…


February 8, 2023

How to Implement CIEM – A Checklist

What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out.


February 8, 2023

Come estrarre dati e valore dalla soluzione EASM di Tenable

It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data.


February 6, 2023

Tenable Cyber Watch: IoT Vendors Lack Vulnerability Disclosures, Cyber Ranks As Top Business Concern - Again, The GAO’s Frustrations with Federal Agencies Not Heeding their Cybersecurity Advice

This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the GAO's frustrations with federal agencies not heeding their cybersecurity advice and provides…


February 3, 2023

Cybersecurity Snapshot: Mentre infuria il fuoco della polemica attorno a ChatGPT, il NIST emette una guida alla sicurezza dell'AI

Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!


February 1, 2023

È ora che il governo degli Stati Uniti aiuti l'Africa a rafforzare la propria sicurezza informatica

African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. 


February 1, 2023

How Attackers Can Exploit GCP’s Multicloud Workload Solution

A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.