Tenable-Blog
How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable

96% Could Have Prevented Their Identity Breach – IDSA
Identity-related breaches are on the rise but security and IAM pros are not idle. Learn from this survey how they are staving off the next attack.
Lückenlose IT-Transparenz erfordert Kontext zu Geschäftsrisiken
Ein vollständiger, kontinuierlich aktualisierter und detaillierter Überblick über sämtliche IT-Assets ist für Sicherheitsteams eines der am schwierigsten zu erreichenden Ziele. Hierzu muss zunächst geklärt werden, was der Begriff „Transparenz“ tatsächlich bedeutet. Es geht dabei um mehr, als einfach nur zu ermitteln, was vorhanden ist, und zu wissen, welche Herausforderungen bewältigt werden müssen.
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Sept. 2 | Shift-left efforts falling short. What CISOs earn and what stresses them out. The quantum computing risk for critical infrastructure. Securing machine learning systems. And much more!
Taking Notice of AWS IAM Roles Anywhere
IAM Roles Anywhere may be a pivotal moment for security — the new service lets you enrich the arsenal of tools at your disposal to improve your AWS security posture.
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Aug. 26 | The “platformization” of hybrid cloud security. Budgeting guidance for CISOs. Tackling IT/OT cybersecurity challenges. Tips for complying with HIPAA’s cybersecurity rule. A roundup of patches, trends and incidents to keep an eye on. And much…
DevSecOps: An Organizational Fix for Improving Cloud Security – Friction-free
By implementing the DevSecOps culture, tools and training, you’ll be on your way to more shift-left security and less organizational friction. Here’s how.
New IT/OT Features Help Tenable Customers Increase Visibility, Security and Control
Tenable.ot v3.14 product features increase coverage of segmented networks and give broader visibility across your operational technology (OT) environment. Now more than ever, it is essential for organizations to understand their cybersecurity baseline. From malicious outsiders and insiders to…
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Aug. 19 | A ransomware defense blueprint for SMBs. Why phishing is getting worse and what to do about it. The government revises its cybersecurity guidance for pipeline operators. A roundup of important vulnerabilities, trends and incidents. And much…
Facing the Shift-Left Security Conundrum. A True Story
Shift left security is hot — until it's not. Dynamic business requirements and cloud complexity pose major least privilege challenges.