Complying with the Monetary Authority of Singapore’s Cloud Advisory: How Tenable Can Help
The Monetary Authority of Singapore’s cloud advisory, part of its 2021 Technology Risk Management Guidelines, advises financial institutions to move beyond siloed monitoring to adopt a continuous, enterprise-wide approach. These firms must undergo annual audits. Here’s how Tenable can help.
Securing Federal Cloud Environments: Overcoming 5 Key Challenges with Tenable Cloud Security
U.S. government agencies face unique challenges as they adopt cloud technologies to meet digital modernization initiatives and adhere to a cloud-first policy. Here’s how Tenable Cloud Security FedRAMP can help.
Identifying and Securing AI Workloads
Learn why AI workloads demand a new approach to cloud security.
What’s New in Tenable Cloud Security: November Updates in Exposure Management
Tenable Cloud Security delivers critical capabilities to unify security across your entire attack surface. Our latest enhancements let you extend your on-prem vulnerability management program to the cloud; gain granular visibility into external access risk; and discover Snowflake sensitive data.
From Brittle to Scalable: AWS Boosts VPC Perimeter Security with New IAM Keys
AWS has released three new IAM condition keys for VPC endpoints to strictly limit access by specific accounts, organizational units, or AWS Organizations. Learn how these keys help you build scalable security perimeters and reduce manual policy maintenance.
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
Context is key for protecting data in the cloud. Learn how an integrated CNAPP approach moves beyond basic DSPM and takes into account identities, misconfigurations, and AI workloads to pinpoint the greatest risks to your cloud data.
Tenable Cloud Vulnerability Management: riduzione del rischio di vulnerabilità nell'era del cloud
Tenable ha lanciato Tenable Cloud Vulnerability Management, una nuova potente offerta all'interno di Tenable One, per aiutare i leader nella gestione delle vulnerabilità a identificare, dare priorità e correggere le esposizioni in ambienti ibridi e multi-cloud.
What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation
We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.
Ridurre al minimo il raggio di azione delle vulnerabilità nel cloud
Tenable Cloud Security unifica la visibilità nel codice, nella build e nelle fasi del runtime. Mette in relazione vulnerabilità, identità e configurazioni errate per stabilire le priorità di sfruttabilità e automatizzare il contenimento, aiutando i team a rilevare, controllare e correggere i rischi in ambienti ibridi e multi-cloud.
Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD
As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce risk, meet compliance, and modernize security
Tenable Recognized as a CTEM Leader in Latio’s 2025 Cloud Security Market Report
Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty.
Non lasciare che la tua sicurezza del cloud vada incontro al permission creep
I team che si occupano di sicurezza del cloud sono spesso ciechi di fronte a una delle maggiori minacce per gli ambienti cloud: una rete di identità con privilegi eccessivi che creano percorsi di attacco per i malintenzionati. Scopri come riprendere il controllo delle tue identità cloud automatizzando l'applicazione del privilegio minimo nel tuo ambiente.