Tenable-Blog
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
Frequently Asked Questions About The August 2025 F5 Security Incident
Frequently asked questions about the August 2025 security incident at F5 and the release of multiple BIG-IP product patches.
Die menschliche Dimension von Cyberrisiken: Wie Exposure Management Burnout in Sicherheitsteams entgegenwirken kann
Den tatsächlichen Preis für Cyberrisiken zahlen Mitarbeiter: Isolierte Tools und unzusammenhängende Abläufe bringen nicht nur Unternehmen in Gefahr, sie stellen auch eine echte Belastung für Teams dar. Es ist längst an der Zeit, Reibungspunkte im Cybersecurity-Bereich zu beseitigen – durch einen einheitlichen, proaktiven Ansatz.
Microsoft’s October 2025 Patch Tuesday Addresses 167 CVEs (CVE-2025-24990, CVE-2025-59230)
Microsoft addresses 167 CVEs in its largest Patch Tuesday to date, including three zero-day vulnerabilities, two of which were exploited in the wild.
Relying on EDR for Exposure Management? Here’s What You Need to Know
Endpoint detection and response tools may serve you well when it comes to handling incident response. But, when used for exposure management, they can leave you blind to large portions of your attack surface.
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.
Exposure Management Beyond The Endpoint
Relying on an endpoint-centric approach to exposure management can leave you with blind spots that increase risk. You need to see your environment like an attacker does.
Cloud-Sicherheit: Vorbeugende Maßnahmen gegen schleichende Berechtigungsausweitung
Cloud-Sicherheitsteams entgeht häufig eine der größten Bedrohungen für Cloud-Umgebungen: ein Geflecht aus übermäßig privilegierten Identitäten, das Angreifern Tür und Tor öffnet. In diesem Blogbeitrag erfahren Sie, wie Sie die Durchsetzung von Least-Privilege-Zugriff in Ihrer gesamten Umgebung automatisieren – und dadurch die Kontrolle über Ihre Cloud-Identitäten zurückgewinnen.
How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
Part two of our Exposure Management Academy series on exposure management maturity explores how organizations like Drogaria Araujo, Tenable and Verizon have applied exposure management to strengthen their security postures.
CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
Following reports the Cl0p ransomware group has been extorting Oracle E-Business Suite customers, Oracle released an advisory for a zero-day that was exploited in the wild.