Securing Critical Infrastructure: It's Complicated
In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can...
View ArticleVMware Patches Multiple Vulnerabilities in Workspace ONE, Identity and...
VMware cautions organizations to patch or mitigate several serious vulnerabilities across multiple products.BackgroundOn April 6, VMware published an advisory (VMSA-2022-0011) addressing eight...
View ArticleMicrosoft’s April 2022 Patch Tuesday Addresses 117 CVEs (CVE-2022-24521)
Microsoft’s April 2022 Patch Tuesday Addresses 117 CVEs (CVE-2022-24521)Microsoft addresses 117 CVEs in its April 2022 Patch Tuesday release, including two zero-day vulnerabilities, one of which was...
View ArticleYou’ve Migrated Business-Critical Functions to the Cloud…Now What?
An expanding attack surface demands a robust cybersecurity strategy. Here’s what you need to know.The shift to remote work over the past two years would not have been possible without cloud computing,...
View ArticleOracle April 2022 Critical Patch Update Addresses 221 CVEs
Oracle addresses 221 CVEs in its second quarterly update of 2022 with 520 patches, including 27 critical updates.BackgroundOn April 19, Oracle released its Critical Patch Update (CPU) for April 2022,...
View ArticleHot Patches for Log4Shell Introduced Multiple Vulnerabilities in Amazon Web...
Hot Patches for Log4Shell Introduced Multiple Vulnerabilities in Amazon Web ServicesAmazon Web Services has addressed vulnerabilities introduced by the hot patches released in response to the Log4Shell...
View ArticleTest Your Hacking Skills: Join Tenable’s Annual CTF Competition!
Tenable launches the 2022 Capture the Flag event for the security community, running from June 9-13.Get ready to test your hacking skills, practice new ones and see how you measure up against others in...
View ArticleIDC Ranks Tenable Number One in Worldwide Device Vulnerability Management...
The research firm’s latest report also provides market insights security professionals can use to improve their vulnerability management strategy.IDC recently published its Worldwide Device...
View ArticleHow to Choose a Modern CSPM Tool to Reduce Your Cloud Infrastructure Risk
Cloud Security Posture Management solutions have become a must for detecting and fixing misconfigurations in public clouds – from code to runtime.As organizations eagerly adopt public cloud services to...
View ArticleManage and Remediate Cloud Infrastructure Misconfiguration Vulnerabilities...
Cloud breaches are on the upswing due to preventable misconfigurations. Here’s how you can lower your risk with a new integration between Tenable.cs and Terraform Cloud.Today’s cloud environments are...
View ArticleCVE-2022-1388: Authentication Bypass in F5 BIG-IP
CVE-2022-1388: Authentication Bypass in F5 BIG-IPF5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution.BackgroundAs part of its Quarterly...
View ArticleThe Era of Responsible Cybersecurity Finally Arrives
The SEC’s proposed rule on cybersecurity promotes transparency and encourages free market forces.The days of cyber negligence are numbered. While nobody can expect perfect cybersecurity, a vast...
View ArticleMicrosoft’s May 2022 Patch Tuesday Addresses 73 CVEs (CVE-2022-26925)
Microsoft addresses 73 CVEs in its May 2022 Patch Tuesday release, including two zero-day vulnerabilities, one of which was exploited in the wild.6Critical66Important0Moderate1LowMicrosoft patched 73...
View ArticleAnnouncing the 2022 Tenable Assure Partner Award Winners
Celebrating the elite defenders who are helping organizations around the world reduce their cyber risk.Cybersecurity is always a team effort. Day in, day out, defenders rely on an ecosystem of teams,...
View Article3 Ways Security Leaders Can Work With DevOps to Build a Culture of Security
Learn how your organization can boost security efforts by eliminating the disconnect between Security and DevOps teams.Establishing a strong security culture that bridges the gap between DevOps and...
View ArticleLocate Tenable Compliance Templates Faster with Revamped Portal
Following a portal relaunch, Tenable’s Audit Files are now easier to find and manage, thanks to a new search engine that supports a variety of search query criteria.Complying with in-house IT policies,...
View ArticleTenable.io Achieves StateRamp Authorization as Part of Our Commitment to...
StateRamp-authorized cloud solutions like Tenable.io meet stringent security and compliance standards.Increasingly targeted by cyber criminals, state and local governments (SLGs) need highly-secure...
View ArticleTerrascan Joins the Nessus Community, Enabling Nessus To Validate Modern...
The addition of Terrascan to the Nessus family of products helps users better secure cloud native infrastructure by identifying misconfigurations, security weaknesses, and policy violations by scanning...
View ArticleMind the (Communication) Gap: How Security Leaders Can Become Dev and Ops...
Developers, Ops and DevOps teams must incorporate security into their processes – often a hard sell. Here’s how security leaders can successfully align with them to weave security into their tools and...
View ArticleCVE-2022-22972: VMware Patches Additional Workspace ONE Access...
Organizations and government agencies are strongly advised to patch two newly disclosed vulnerabilities in VMware products, following warnings from VMware and the Cybersecurity and Infrastructure...
View Article