Quantcast
Channel: Tenable Blog

Image may be NSFW.
Clik here to view.

How to Use Risk-Based Metrics in an Exposure Management Program

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security...

View Article


Image may be NSFW.
Clik here to view.

Microsoft’s June 2025 Patch Tuesday Addresses 65 CVEs (CVE-2025-33053)

9Critical56Important0Moderate0LowMicrosoft addresses 65 CVEs, including two zero-day vulnerabilities, with one being exploited in the wild.Microsoft addresses 65 CVEs in its June 2025 Patch Tuesday...

View Article


Image may be NSFW.
Clik here to view.

New Cybersecurity Executive Order: What You Need To Know

A new cybersecurity Executive Order aims to modernize federal cybersecurity with key provisions for post-quantum encryption, AI risk and secure software development.On June 6, 2025, the White House...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: NIST Offers Zero Trust Implementation Advice, While...

Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about...

View Article

Image may be NSFW.
Clik here to view.

Exposure Management Is the Future of Proactive Security

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Jorge Orchilles,...

View Article


Image may be NSFW.
Clik here to view.

GerriScary: Hacking the Supply Chain of Popular Google Products (ChromiumOS,...

Tenable Cloud Research discovered a supply chain compromise vulnerability in Google's Gerrit code-collaboration platform which we dubbed GerriScary. GerriScary allowed unauthorized code submission to...

View Article

Image may be NSFW.
Clik here to view.

Secrets in the Open: Cloud Data Exposures That Put Your Business at Risk

Sensitive data and secrets are leaking. How cloud security leaders can shut them down.Despite the billions of dollars organizations are investing in cybersecurity, one of the most preventable threats...

View Article

Image may be NSFW.
Clik here to view.

Stronger Cloud Security in Five: Accelerate Response in the Cloud

In this sixth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three recommendations that you can quickly roll out to help you expedite, prioritize and fine-tune how you...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Snapshot: Tenable Report Spotlights Cloud Exposures, as Google...

Check out highlights from Tenable’s “2025 Cloud Security Risk Report,” which delves into the critical risk from insecure cloud configurations. Plus, Google reveals a Russia-sponsored social engineering...

View Article


Image may be NSFW.
Clik here to view.

How Exposure Management Helps Communicate Cyber Risk

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, Tenable experts...

View Article