Tenable-Blog
How Exposure Management Has Helped Tenable Reduce Risk and Align with the Business

Cybersecurity Snapshot: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses
Check out the FBI’s alert on Russia-backed hackers infiltrating critical infrastructure networks via an old Cisco bug. Plus, MITRE dropped a revamped list of the most critical hardware security flaws. Meanwhile, NIST rolled out a battle plan against face-morphing deepfakes. And get the latest on the...
How Tenable Moved From Siloed Security to Exposure Management
Jeden Montag bietet Ihnen die Tenable Exposure Management Academy konkrete, praxisnahe Hilfestellungen, die Sie für einen erfolgreichen Übergang von Schwachstellenmanagement zu Exposure Management benötigen. In the first of a two-part blog series, Tenable CSO Robert Huber shares how he and his...
Cybersecurity Snapshot: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices
CISA stresses that an asset inventory is the foundation for OT security. Meanwhile, NIST has finalized cryptographic algorithms for resource-constrained devices. The agency is also developing control overlays for AI systems. Plus, a report reveals that security budget growth has slowed to a five-yea...
How Tenable One Helps Canadian Orgs Set Up Exposure Management Programs and Meet Compliance Demands
The Tenable One Exposure Management Platform provides a single source of truth for cyber risk, helping Canadian security teams shift from reactive patching to proactive risk reduction. With native support for Canadian data residency and alignment with frameworks like ITSG-33, Tenable One helps Canad...
CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
Exploit code is reportedly available for a critical command injection vulnerability affecting Fortinet FortiSIEM devices.BackgroundOn August 12, Fortinet published a security advisory (FG-IR-25-152) for CVE-2025-25256, a critical command injection vulnerability affecting Fortinet FortiSIEM.CVEDescri...
How to Remediate Risk to Critical OT/IoT Systems without Disrupting Operations
Find out how adopting a proactive approach to secure your operational environments can help you reduce risk and eliminate downtime....
Microsoft’s August 2025 Patch Tuesday Addresses 107 CVEs (CVE-2025-53779)
Microsoft addresses 107 CVEs, including one zero-day vulnerability that was publicly disclosed....
From Vulnerability to Visibility: What the SharePoint Attacks Reveal About the Need for Proactive Cybersecurity
The recent exploitation of Microsoft SharePoint vulnerabilities highlights a critical gap in traditional, reactive cybersecurity strategies. Learn how a proactive exposure management approach empowers federal agencies to reduce risk, streamline operations and stay secure....
The Breach You Didn’t See Coming: How Invisible Combinations of Risk Are Exposing Your Organization
Most breaches don’t happen because of one glaring issue. They happen when multiple, seemingly low-risk factors silently combine. Learn how invisible risk combinations evade siloed security tools and how an exposure management program gives defenders the context they need to stop attacks before they ...