Quantcast
Channel: Tenable Blog

Image may be NSFW.
Clik here to view.

Tenable Supercharges Exposure Management with Acquisition of Vulcan Cyber

Vulcan brings more than 100 additional third-party integrations and enhanced remediation workflows to the Tenable One Exposure Management Platform, enabling organizations to prioritize their security...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Cyber Agencies Offer Best Practices for Network Edge...

Check out recommendations from CISA and others on how to protect network edge devices and applications. Plus, OWASP has published the 10 risks associated with non-human identities. In addition, find...

View Article


Image may be NSFW.
Clik here to view.

Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418,...

3Critical52Important0Moderate0LowMicrosoft addresses 55 CVEs with three rated critical and four zero-day vulnerabilities, including two that were exploited in the wild.Microsoft patched 55 CVEs in its...

View Article

Image may be NSFW.
Clik here to view.

Frequently Asked Questions About DeepSeek Large Language Model (LLM)

The open-source LLM known as DeepSeek has attracted much attention in recent weeks with the release of DeepSeek V3 and DeepSeek R1, and in this blog, The Tenable Security Response Team answers some of...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow...

Check out best practices for preventing buffer overflow attacks. Plus, Europol offers best practices for banks to adopt quantum-resistant cryptography. Meanwhile, an informal Tenable poll looks at...

View Article


Image may be NSFW.
Clik here to view.

How To Reduce DNS Infrastructure Risk To Secure Your Cloud Attack Surface

Mismanaging your DNS infrastructure could put you at risk of destructive cyberattacks – especially as your cloud attack surface expands. Read on to learn about DNS vulnerabilities, the impact of DNS...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Ghost Ransomware Group Targets Known Vulns, CISA...

Check out mitigation recommendations to protect your organization against the Ghost ransomware gang. Plus, get tips on how to attract and retain top cybersecurity professionals. And get the latest on...

View Article

Image may be NSFW.
Clik here to view.

Identity Is the New Battleground: Why Proactive Security Is the Way Forward

Protecting identities has become a top priority for security teams. However, many organizations remain exposed due to blind spots caused by identity sprawl and misplaced trust in identity providers....

View Article


Image may be NSFW.
Clik here to view.

Identity Security Is the Missing Link To Combatting Advanced OT Threats

Sophisticated OT threats, like living-off-the-land (LotL) attacks, exploit identity vulnerabilities to infiltrate critical infrastructure. Find out how robust identity security and unified exposure...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: OpenSSF Unveils Framework for Securing Open Source...

Check out a new framework for better securing open source projects. Plus, learn how AI is making ransomware harder to detect and mitigate. In addition, find out the responsible AI challenges orgs face...

View Article