What Makes This “Data Privacy Day” Different?
As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Strategist, wants to remind us that we live in a digital world and that we need to protect it. With data breaches a daily occurrence, and AI changing the playing field, he urges everyone to “do better.”...
New CISA Hardening Guidance Provides Valuable Insights for Network Security Engineers
Recent guidance from CISA and the FBI highlights best practices to monitor and harden network infrastructure. The guidance, published in response to high-profile attacks on telecom infrastructure, is applicable to a wider audience. This blog unpacks important points and explains how Tenable products...
Data Security in Healthcare: How Tenable Cloud Security Can Help
Healthcare is one of the most highly regulated industry sectors in the world. Adhering to compliance standards while also ensuring optimal patient experiences is a challenge. DSPM capabilities in Tenable Cloud Security can ease the burden on cybersecurity teams....
If You Only Have 1 Minute: Quick Tips for Effective Exposure Response
Comprehensive, action-oriented workflows and key metrics are the cornerstones of a successful exposure response program. Here’s what you need to know....
If You Only Have 2 Minutes: Best Practices for Setting Exposure Response SLAs
Keeping vulnerability management efforts focused on achievable goals is key to avoiding cybersecurity team burnout. Here’s how exposure response workflows and SLAs can help....
If You Only Have 3 Minutes: Key Elements of Effective Exposure Response
Learned helplessness and lack of prioritization are two vulnerability management pitfalls cybersecurity teams face. Here’s how an exposure response program can help....
Kontext ist das A und O: Von Vulnerability Management zu Cyber Exposure Management
Vulnerability Management ist und bleibt ein Eckpfeiler der präventiven Cybersecurity, doch Unternehmen haben nach wie vor mit einer Flut von Schwachstellen und immer ausgefeilteren Bedrohungen zu kämpfen. Tenable’s new Exposure Signals gives security teams comprehensive context, so they can shift from vulnerability management to exposure m...
Hardening Ihrer Cloud-Sicherheitslage durch Schutz Ihrer Cloud-Daten und KI-Ressourcen
Learn how data security posture management (DSPM) and AI security posture management (AI-SPM) can help you address key cloud security challenges....
The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy
DSPM solutions provide a comprehensive, up-to-date view into cloud-based data and risk. An integrated CNAPP and DSPM solution elevates this analysis to expose toxic combinations and security gaps across cloud environments. ...
Absicherung Ihrer sich ausbreitenden Angriffsfläche – mit risikobasiertem Schwachstellenmanagement
Die Cloud, künstliche Intelligenz (KI), maschinelles Lernen (ML) und weitere technologische Durchbrüche verändern moderne Arbeitsumgebungen radikal. Neue Assets und Services bieten erhöhte Flexibilität, Wachstumspotenzial und Zugang zu mehr Ressourcen, führen aber auch zu neuen Sicherheitsrisiken. Man...
CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It?
Conventional wisdom suggests the keys to protect critical infrastructure against cyberattacks are network segmentation and OT security. But continued breaches imply those methods alone fall short. In fact, a CISA probe of 121 critical infrastructure networks found that their weakest link is identity...
Detecting Risky Third-party Drivers on Windows Assets
Kernel-mode drivers are critical yet risky components of the Windows operating system. Learn about their functionality, the dangers they pose, and how Tenable's new plugins can help identify and mitigate vulnerabilities using community-driven resources like LOLDrivers....