Minimize the Vulnerability Blast Radius in the Cloud
Tenable Cloud Security unifies visibility across code, build, and runtime stages. It correlates vulnerabilities, identities, and misconfigurations to prioritize exploitability and automate containment — helping teams detect, control, and remediate risks across multi-cloud and hybrid environments.
Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD
As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce risk, meet compliance, and modernize security
Tenable Recognized as a CTEM Leader in Latio’s 2025 Cloud Security Market Report
Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty.
Cloud-Sicherheit: Vorbeugende Maßnahmen gegen schleichende Berechtigungsausweitung
Cloud-Sicherheitsteams entgeht häufig eine der größten Bedrohungen für Cloud-Umgebungen: ein Geflecht aus übermäßig privilegierten Identitäten, das Angreifern Tür und Tor öffnet. In diesem Blogbeitrag erfahren Sie, wie Sie die Durchsetzung von Least-Privilege-Zugriff in Ihrer gesamten Umgebung automatisieren – und dadurch die Kontrolle über Ihre Cloud-Identitäten zurückgewinnen.
The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration
Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to: search-injection attacks on its Search Personalization…
Entschärfung von riskanten Fehlkonfigurationen in der Cloud: Verborgene Cloud-Sicherheitslücken aufspüren und beheben
Seemingly innocuous cloud configuration errors can create massive security risks, especially if your teams are siloed and your security tools don’t play well with each other. Find out how a unified, proactive security approach provides the visibility and automation needed to find and fix these…
What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience
Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows and gain deeper visibility across workloads,…
Keine blinden Flecken mehr: Vollständige SDLC-Transparenz in Multi-Cloud-Umgebungen
Sie haben mit einer unübersichtlichen Multi-Cloud-Umgebung zu kämpfen? In diesem Blogbeitrag erfahren Sie, wie der einheitliche Cloud-Sicherheitsansatz von Tenable Ihnen hilft, gefährliche blinde Flecken zu beseitigen, vollständige Sichtbarkeit und Kontrolle zu erzielen und Assets abzusichern – von der ersten Codezeile bis zur gesamten Produktion.
Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale
Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an…
Neuer Tenable-Bericht: Wie Komplexität und schwache KI-Sicherheit Cloud-Umgebungen gefährden
This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…
Abbau von Silos: Warum eine ganzheitliche Betrachtung von Cloud-Risiken notwendig ist
A disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform – giving you the context to pinpoint your…
Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials
Despite all the innovation in cloud computing, one persistent issue lurks in the shadows to undermine security hygiene - poor secrets management. Here, we explain compromised secrets’ impacts and causes and offer concrete risk-mitigation recommendations.