Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog di Tenable

July 29, 2025

Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats.

January 26, 2023

In che modo l'analisi dei dati sulla superficie di attacco esterna potenzia la tua strategia di sicurezza 

Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....


January 25, 2023

Tenable.sc 6.0: Un importante aggiornamento che aumenta la visibilità e la produttività

Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...


January 23, 2023

Tenable Cyber Watch: la sicurezza informatica tra i 10 principali rischi globali del World Economic Forum, i problemi informatici ostacolano ancora il valore del cloud e tanto altro ancora

We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity.  Happy Monday! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, t...


January 20, 2023

Cybersecurity Snapshot: I CISO sono più felici, ma i team di sviluppo non hanno ancora sviluppato sufficienti competenze di coding

Learn all about the spike in CISO job satisfaction. Plus, NIST mulls major makeover of its Cybersecurity Framework. Also, the struggle to develop secure apps is real. Then check out how Uncle Sam plans to use AI and ML to boost cybersecurity. And much more!...


January 19, 2023

EmojiDeploy: Smile! Your Azure web service just got RCE’d ._.

The Tenable Cloud Security research team discovered a remote code execution vulnerability affecting Microsoft Azure cloud services such as Function Apps, App Service, Logic Apps and others, as well as other cloud sovereigns....


January 19, 2023

L'aggiornamento della patch critica di Oracle di gennaio 2023 risolve 183 CVE

Oracle addresses 183 CVEs in its first quarterly update of quarterly with 327 patches, including 71 critical updates....


January 17, 2023

Non puoi risolvere tutto: come adottare un approccio informato sul rischio per la correzione delle vulnerabilità

Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help....


January 16, 2023

Tenable Cyber Watch: le competenze informatiche più richieste, le principali tendenze nella sicurezza del cloud, la spesa informatica e altro ancora

We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity.  It's Monday! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, the w...


January 16, 2023

Microsoft Azure Virtual Machines: Public IP Configuration Is Not Always As It Seems

If you’re not familiar enough with the SKU attribute of the Azure public IP address, you may think you’re configuring your virtual machines as public to the internet … but you aren’t....


Novità sulla sicurezza informatica

Inserisci l'e-mail per non perderti avvisi tempestivi e indicazioni sulla sicurezza da parte degli esperti di Tenable.

Uno sguardo all'interno dell'ecosistema dei ransomware

Scarica il report >