How to Unlock Advanced IoT Visibility for Cyber-Physical Systems
October 1, 2024As the number of IoT devices deployed globally continues to rise, cyber-physical systems and business operations are exposed to greater risk. Improving asset visibility, monitoring and risk management are critical steps to preventing breaches.
Strengthening the Nessus Software Supply Chain with SLSA
April 16, 2024You know Tenable as a cybersecurity industry leader whose world-class exposure management products are trusted by our approximately 43,000 customers, including about 60% of the Fortune 500. But sometimes we like to give you a peek behind the curtain to share how we protect our own house against cyberattacks – and that’s what this blog is about. Today we’re sharing our experience adopting the supply-chain security framework SLSA, with the hopes that the lessons we learned will be helpful to you.
How Industry Partnerships Support Taking a Proactive, Preventive Approach to Cybersecurity
February 16, 2023Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can benefit customers.
Tenable One Exposure Management Platform: Unlocking the Power of Data
November 3, 2022When our data engineering team was enlisted to work on Tenable One, we knew we needed a strong partner. Here’s how we selected Snowflake to help us deliver on the promise of exposure management.
Python NaN Injection
December 29, 2021In Python, a NaN can cause a slew of errors leading to numerous failure conditions. Test for NaNs using a white-box scenario to avoid fallout.
An Introduction to “Scan Everything”
September 21, 2021A “scan everything” approach tests and triages every asset to understand your organization’s risk and how to reduce risk quickly and efficiently.
10 Reasons Why Websites STILL Get Hacked
June 21, 2021Even with all of the cybersecurity solutions on the market today, websites are still getting hacked by attackers. Find out how your organization could be exposed to hackers
Do Not Take an IP-centric Approach to Attack Surface Mapping
May 5, 2021Relying on IP data to identify assets means you're likely missing critical information needed to map your attack surface.
High-Fidelity Attack Surface Mapping
April 12, 2021Eliminate blind spots and hinder attackers using these three tips to create a high-fidelity map of your organization’s entire attack surface.
NetFlow is the Wrong Way to Do Attack Surface Mapping
March 26, 2021If your organization relies on NetFlow data for asset management, you're likely overlooking vital information to map your attack surface.
Static Lists Are The Wrong Way to Do Attack Surface Mapping
March 8, 2021When identifying and cataloging assets, static lists leave your organization vulnerable to constant changes across your attack surface.
What Is VPR and How Is It Different from CVSS?
April 16, 2020This blog series will provide an in-depth discussion of vulnerability priority rating (VPR) from a number of different perspectives. Part one will focus on the distinguishing characteristics of VPR th...