Tenable-Blog
Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future

The AI Security Dilemma: Navigating the High-Stakes World of Cloud AI
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.Artificial Intelligence is no longer on the horizon; it's here, and it's being built and deployed…
Das neue Tenable AI Exposure: Schluss mit Rätselraten – beginnen Sie mit der Absicherung Ihrer KI-Angriffsfläche
Mit Tenable AI Exposure – ab sofort verfügbar in Tenable One – haben Sie stets im Blick, wie Ihre Teams KI-Plattformen nutzen und wo diese Nutzung Daten, Benutzer und Schutzmaßnahmen Ihres Unternehmens in Gefahr bringen könnte.
CVE-2025-54135, CVE-2025-54136: Frequently Asked Questions About Vulnerabilities in Cursor IDE (CurXecute and MCPoison)
Researchers have disclosed two vulnerabilities in Cursor, the popular AI-assisted code editor, that impact its handling of model context protocol (MCP) servers, which could be used to gain code execution on vulnerable systems.
Frequently Asked Questions About SonicWall Gen 7 Firewall Ransomware Activity
An increase in ransomware activity tied to SonicWall Gen 7 Firewalls has been observed, possibly linked to the exploitation of a zero-day vulnerability in its SSL VPN.
The White House AI Action Plan: A Critical Opportunity to Secure the Future
AI without built-in cybersecurity remains a liability. The AI Action Plan presents a pivotal opportunity to get this right by emphasizing a secure-by-design approach.
In Cybersecurity, We Have to Work Together
The future of cybersecurity depends on open, collaborative platforms that bring the industry's best solutions together.
How Exposure Management Moves Beyond Vulnerability Scans to A Unified View of Risk
Jeden Montag bietet Ihnen die Tenable Exposure Management Academy konkrete, praxisnahe Hilfestellungen, die Sie für einen erfolgreichen Übergang von Schwachstellenmanagement zu Exposure Management benötigen. In this post, we look at the results of a survey taken during a recent Tenable webinar on the level of familiarity with exposure…
Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation;…
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight
Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats.