Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable-Blog

April 1, 2026

Frequently Asked Questions About the Axios npm Supply Chain Attack by North Korea-Nexus Threat Actor UNC1069

A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during a three-hour window on March 31.

November 6, 2025

Why Security and IT Disagree on Patching (and Why That's a Good Thing)

Let's be frank, for most organizations, patching is a mess. It's the flashpoint where two of the most critical departments in the company, security and IT, seem to be working against each other.


November 5, 2025

7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution

Not all exposure management platforms are created equal. But how can you pick the right one for your organization? Here’s a set of questions designed to help you cut through vendor noise and make an informed decision.


November 5, 2025

HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage

Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.


November 4, 2025

Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security

Discover how the latest NERC CIP standard for Internal Network Security Monitoring (INSM) shifts the focus inside your network, and how Tenable can help deliver the comprehensive visibility required to achieve compliance and enhance security.


October 31, 2025

Cybersecurity Snapshot: Top Guidance for Improving AI Risk Management, Governance and Readiness

Many organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks.


October 30, 2025

Minimierung des Wirkungsradius von Schwachstellen in der Cloud

Tenable Cloud Security vereinheitlicht Sichtbarkeit in der Code-, Build- und Runtime-Phase. Die Lösung korreliert Schwachstellen, Identitäten und Fehlkonfigurationen, um sie anhand ihrer Ausnutzbarkeit zu priorisieren und Eindämmungsmaßnahmen zu automatisieren. Dies hilft Teams, Risiken zu erkennen, unter Kontrolle zu bringen und zu beseitigen – über Multi-Cloud- und Hybrid-Umgebungen hinweg.


October 28, 2025

Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD

As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce risk, meet compliance, and modernize security


October 28, 2025

Security for AI: A Practical Guide to Enforcing Your AI Acceptable Use Policy

An AI acceptable use policy can help your organization mitigate the risk of employees accidentally exposing sensitive data to public AI tools. Benchmark your organization’s policy against our best practices and discover how prompt-level visibility from Tenable AI Exposure eases policy enforcement.


October 27, 2025

How to Take Vulnerability Management to the Next Level and Supercharge Your Career

At Tenable, we believe the next generation of great CISOs and security leaders will arise from those vulnerability management professionals who are driving the shift to exposure management today.


Cybersecurity-Nachrichten, die Ihnen nutzen können

Geben Sie Ihre E-Mail-Adresse ein, um keine aktuellen Warnungen und Sicherheitshinweise der Experten von Tenable zu verpassen.