How to Use Risk-Based Metrics in an Exposure Management Program
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security...
View ArticleMicrosoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053)
9Critical56Important0Moderate0LowMicrosoft addresses 65 CVEs, including two zero-day vulnerabilities, with one being exploited in the wild.Microsoft addresses 65 CVEs in its June 2025 Patch Tuesday...
View ArticleNew Cybersecurity Executive Order: What You Need To Know
A new cybersecurity Executive Order aims to modernize federal cybersecurity with key provisions for post-quantum encryption, AI risk and secure software development.On June 6, 2025, the White House...
View ArticleCybersecurity Snapshot: NIST Offers Zero Trust Implementation Advice, While...
Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about...
View ArticleExposure Management Is the Future of Proactive Security
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Jorge Orchilles,...
View ArticleGerriScary: Hacking the Supply Chain of Popular Google Products (ChromiumOS,...
Tenable Cloud Research discovered a supply chain compromise vulnerability in Google's Gerrit code-collaboration platform which we dubbed GerriScary. GerriScary allowed unauthorized code submission to...
View ArticleSecrets in the Open: Cloud Data Exposures That Put Your Business at Risk
Sensitive data and secrets are leaking. How cloud security leaders can shut them down.Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats...
View ArticleStronger Cloud Security in Five: Accelerate Response in the Cloud
In this sixth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three recommendations that you can quickly roll out to help you expedite, prioritize and fine-tune how you...
View ArticleCybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google...
Check out highlights from Tenable’s “2025 Cloud Security Risk Report,” which delves into the critical risk from insecure cloud configurations. Plus, Google reveals a Russia-sponsored social engineering...
View ArticleHow Exposure Management Helps Communicate Cyber Risk
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, Tenable experts...
View Article