Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

December 19, 2025

Cybersecurity Snapshot: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say

Formerly “AI shy” cyber pros have done a 180 and become AI power users, as AI forces data security changes, the CSA says. Plus, PwC predicts orgs will get serious about responsible AI usage in 2026, while the NCSC states that, no, prompt injection isn’t the new SQL injection. E molto altro ancora!

March 12, 2024

Microsoft’s March 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-21407)

Microsoft addresses 59 CVEs in its March 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.


March 12, 2024

What’s in Store This Year for Tenable Partners? A Lot of Growth, Including 25,000 Trees!

Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our partners.


March 11, 2024

Come proteggere i tuoi asset IT, OT e IoT con una piattaforma di gestione dell'esposizione: l'importanza della prioritizzazione contestuale

Scopri come la prioritizzazione delle esposizioni contestuale sta rivoluzionando la sicurezza OT/IoT, consentendo alle organizzazioni di passare dalla prevenzione delle violazioni reattiva a quella proattiva.


March 8, 2024

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And…


March 6, 2024

CVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in JetBrains TeamCity

Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution.


March 1, 2024

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. E molto altro ancora!


February 29, 2024

Come proteggere i tuoi asset IT, OT e IoT con una piattaforma di gestione dell'esposizione

I team di sicurezza aziendale affrontano seri ostacoli per proteggere le infrastrutture OT/IoT critiche, tra cui visibilità frammentaria, rischi imprevisti e silos di dati.Discover how purpose-built solutions for OT/IoT exposure management can help organizations enhance visibility, prioritize…


February 23, 2024

Cybersecurity Snapshot: LockBit Gang Gets Knocked Down, as CISA Stresses Security of Water Plants

Check out how cyber agencies from multiple countries hit the LockBit ransomware group. Meanwhile, CISA wants water treatment plants to button up their cyber defenses. Plus, there’s a new generative AI governance checklist for tech and business leaders. And the White House seeks to boost ports'…


February 22, 2024

IDC classifica Tenable al primo posto per la presenza sul mercato della gestione delle vulnerabilità dei dispositivi a livello mondiale per il quinto anno consecutivo

L'ultimo report della società di ricerca fornisce anche informazioni sul mercato, di cui possono usufruire i professionisti della sicurezza per migliorare la loro strategia di gestione delle vulnerabilità.


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.

Uno sguardo all'interno dell'ecosistema dei ransomware

Scarica il report >

× Contatta il team di vendita