New IT/OT Features Help Tenable Customers Increase Visibility, Security and...
Tenable.ot v3.14 product features increase coverage of segmented networks and give broader visibility across your operational technology (OT) environment.Now more than ever, it is essential for...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Aug. 26 | The “platformization” of hybrid cloud security. Budgeting guidance for CISOs. Tackling IT/OT cybersecurity challenges. Tips for complying with...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 2 | Shift-left efforts falling short. What CISOs earn and what stresses them out. The quantum computing risk for critical infrastructure. Securing...
View ArticleFull IT Visibility Requires Business Risk Context
Having a full, continuously updated and detailed understanding of all IT assets is one of the holy grails for security teams. To achieve it, we must first understand what “visibility” truly entails,...
View ArticleIT/OT Convergence: Now Is the Time to Act
Presidential advisory committee provides recommendations to improve critical infrastructure security.Critical infrastructure in the U.S. faces a significantly heightened threat landscape. The...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security tools. Increasing diversity in cybersecurity. Another...
View ArticleTuning Network Assessments for Performance and Resource Usage
Using the correct tool for the job and optimizing scanner placement will have a large impact on scan efficiency with Nessus, Tenable.io and Tenable.sc.When working with Nessus at scale or in unique...
View ArticleMicrosoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)
Microsoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)Microsoft addresses 62 CVEs in its September 2022 Patch Tuesday release, including five critical...
View ArticleCVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the Wild
CVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the WildTrend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been...
View ArticleAA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic...
Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks.BackgroundOn...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity |...
View ArticleFinally Finding the 'Unknown Unknowns' Across Your Entire Attack Surface
CISOs dread the “unknown unknowns” – the assets, vulnerabilities, misconfigurations and system weaknesses that the security team hasn’t detected and thus hasn’t secured. These blind spots represent a...
View Article$1 Billion State and Local Cybersecurity Grant Program Now Open for Applicants
As threats continue to evolve, state and local governments benefit from federal grant funding to bolster their cybersecurity posture.When a state, local, tribal and territorial (SLTT) government falls...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 23 | A digital trust disconnect between theory and practice | Don’t ignore attack surface management | An SBOM 101 | Report finds hackers targeting...
View ArticleThe shift to integrated cybersecurity platforms: a growing trend among CISOs
New ESG and ISSA study shows nearly half of organizations are shifting towards integrated cybersecurity platforms. Here’s why many CISOs are making the shift.Less complexity, more security.The shift to...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical infrastructure from cyberattacks | How to prevent MFA fatigue attacks |...
View ArticleCVE-2022-41040 and CVE-2022-41082: ProxyShell Variant Exploited in the Wild
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available.BackgroundOn September 28, GTSC...
View ArticleExposure Management: Reducing Risk in the Modern Attack Surface
Cybersecurity organizations struggle with reactive and siloed security programs and with a sprawl of point tools that generate heaps of fragmented data but few insights. Here we explain why they need...
View ArticleIntroducing the Tenable One Exposure Management Platform
Anticipate likely attacks. Proactively reduce your exposure. Communicate with your key stakeholders.Today, Tenable is proud to announce the Tenable One Exposure Management Platform, which unifies a...
View ArticleCybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of...
View Article