Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

July 29, 2025

Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats.

January 12, 2024

Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks

Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and h...


January 10, 2024

CVE-2023-46805, CVE-2024-21887: Zero-Day Vulnerabilities Exploited in Ivanti Connect Secure and Policy Secure Gateways

Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors....


January 9, 2024

Microsoft’s January 2024 Patch Tuesday Addresses 48 CVEs (CVE-2024-20674)

Microsoft addresses 48 CVEs in its January 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities....


January 9, 2024

Building Resilient OT Environments: Safeguards for Electric Utilities

Recent cyberattacks on critical infrastructure demonstrate how hackers can take advantage of industrial control systems. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....


January 8, 2024

Come appassionarsi agli audit e alla conformità: è possibile

Proteggere i carichi di lavoro in corso nel cloud pubblico e rispettare gli standard di conformità sono pilastri non negoziabili per la maggior parte delle aziende. Tuttavia, unire le necessarie funzionalità di visibilità, mappatura e monitoraggio è spesso un lungo processo manuale. As a result, audits and compliance exercises ...


January 5, 2024

Cybersecurity Snapshot: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang

Want to learn more about protecting AI systems from malicious actors? A new NIST guide aims to help you identify and mitigate attacks targeting AI tools. Plus, new granular configuration recommendations for securing Microsoft 365 are out. In addition, the cost of cyber incidents is rising. And there...


January 3, 2024

$18.2 Million Funding Available for Tribal Government Cybersecurity

The Tribal Cybersecurity Grant Program (TCGP) is accepting applications through January 10, making $18.2 million in federal grant funding available to eligible tribes to reduce cyber risk....


December 29, 2023

Tenable OT Security: 2023 Year in Review

As we reflect on the many accomplishments Tenable OT Security achieved in 2023, one thing is clear: we couldn’t have done it without the support and collaboration of our customers and partners....


December 29, 2023

Cybersecurity Snapshot: What’s in Store for 2024 in Cyberland? Check Out Tenable Experts’ Predictions for OT Security, AI, Cloud Security, IAM and more

The new year is upon us, and so we ponder the question: What cybersecurity trends will shape 2024? To find out, we asked Tenable experts to read the tea leaves. Their 2024 forecasts include: A bigger security role for cloud architects; a focus by ransomware gangs on OT systems in critical industries...


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.

Uno sguardo all'interno dell'ecosistema dei ransomware

Scarica il report >