Bridging the gap: How to integrate Claude Security into the Tenable One Exposure Management Platform
Bridge the gap between AI-driven vulnerability discovery and prioritized remediation. Learn how to integrate Claude Security’s deep-logic analysis into Tenable One to unify your attack surface, eliminate noise, and focus on the risks that matter most.
Mastering agentic AI security through exposure management
As AI tools evolve from siloed chatbots to autonomous, hyperconnected systems, they create a vast new attack surface. Discover how to manage this risk by focusing on visibility, agency, and semantic security to protect your organization’s increasingly complex landscape of agentic AI systems.
Fünf Schritte, um Mythos-bereit zu werden
KI deckt Schwachstellen in einem Ausmaß auf, das herkömmliche Abwehrmaßnahmen überfordert. Hier erfahren Sie, wie Sie eine IT-Sicherheitsorganisation aufbauen, die auf Mythos vorbereitet ist.
Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from Anthropic
With the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model on your cybersecurity strategy. Here’s how to prepare.
Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI
See how you can use Tenable Hexa AI to determine in minutes if you're impacted by the Axios npm supply chain attack. Learn how easy it is to automate configuration of scans, identify impacted assets, prioritize remediation, and more using agentic AI from Tenable.
Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection
Tenable One's new Model Refusal Detection turns an LLM's refusal to execute a risky or suspicious prompt into a high-fidelity early warning signal. It helps you uncover and stop prompt injection attacks, insider threats, and other risky behaviors before they escalate into a breach.
Security for AI: A guide to managing the risks of vibe coding and AI in software development
Get a template for an AI coding acceptable use policy with security controls and a list of 25 security questions to ask software developers and “citizen developers” about their AI use. Mitigate the security risks of vibe coding and using AI in software development with Tenable One.
Wir stellen vor: Tenable Hexa AI – agentische KI für Exposure Management
Lernen Sie Tenable Hexa AI kennen – die agentische Engine der Exposure Management-Plattform Tenable One. In diesem Blogbeitrag erfahren Sie, wie Tenable Hexa AI komplexe Sicherheits-Workflows automatisiert und Exposure-Informationen in koordinierte Maßnahmen transformiert, die Ihr Sicherheitsteam bei der wirksamen Reduzierung von Cyberrisiken unterstützen.
Don't confuse asset inventory with exposure management
Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can't connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don't have exposure management. You have inventory.
LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities
Tenable Research revealed "LeakyLooker," a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have let attackers exfiltrate or modify data across Google services like BigQuery and Google Sheets. Google has since remediated all identified issues.
Gartner® benennt Tenable in einem 2025er Bericht als das Unternehmen, das es bei KI-gestützter Exposure-Bewertug aktuell zu schlagen gilt („Company to beat“).
„Die Abdeckung von Assets und Angriffsflächen, die Anwendung von KI und der gute Ruf von Tenable bei der Bewertung von Schwachstellen machen das Unternehmen zum Spitzenreiter bei der KI-gestützten Exposure-Bewertung“, schreibt Gartner in „AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment.“ (Zitat übersetzt von Tenable)
What Anthropic’s Latest Model Reveals About the Future of Cybersecurity
AI can find vulnerabilities with unprecedented speed, but discovery alone doesn’t reduce cyber risk. We need exposure prioritization, contextual risk analysis, and AI-driven remediation to transform findings into security outcomes.