Tenable-Blog
Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale

Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success
An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize actions and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re…
New Tenable Report: How Complexity and Weak AI Security Put Cloud Environments at Risk
This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…
Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)
Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.
Breaking Down Silos: Why You Need an Ecosystem View of Cloud Risk
A disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform – giving you the context to pinpoint your…
Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials
Despite all the innovation in cloud computing, one persistent issue lurks in the shadows to undermine security hygiene - poor secrets management. Here, we explain compromised secrets’ impacts and causes and offer concrete risk-mitigation recommendations.
ICYMI: Exposure Management Academy on Attack Surface Management, Proactive Security and More
Jeden Montag bietet Ihnen die Tenable Exposure Management Academy konkrete, praxisnahe Hilfestellungen, die Sie für einen erfolgreichen Übergang von Schwachstellenmanagement zu Exposure Management benötigen. In this post, we look back on the guidance and best practices shared in the past several months.
Cybersecurity Snapshot: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure
Destructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical infrastructure networks. With this type of cyber threat in the…
Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector
Compromised credentials are now the leading cause of cloud breaches, making identity your most critical attack surface. A new IDC white paper explores why this shift is happening and where traditional defenses fall short. Read on to learn how Tenable's identity-first approach turns this risk into…
Tenable Response to Salesforce and Salesloft Drift Incident
At Tenable, we take transparency seriously, especially when it comes to protecting our customers’ data. We recently learned of a widespread data theft campaign involving the integration of Salesforce and Salesloft Drift, and Tenable was among the many organizations impacted. In line with our…