What’s new in Tenable Cloud Security: Custom policies, AWS ABAC, and research-driven protection
Stop the noise and scale your cloud security. Our latest updates introduce custom policy automation via Explorer, AWS ABAC support for true least privilege, and research-backed protection against critical vulnerabilities, all designed to slash MTTR without disrupting your DevOps workflows.
Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection
Tenable One's new Model Refusal Detection turns an LLM's refusal to execute a risky or suspicious prompt into a high-fidelity early warning signal. It helps you uncover and stop prompt injection attacks, insider threats, and other risky behaviors before they escalate into a breach.
Security for AI: A guide to managing the risks of vibe coding and AI in software development
Get a template for an AI coding acceptable use policy with security controls and a list of 25 security questions to ask software developers and “citizen developers” about their AI use. Mitigate the security risks of vibe coding and using AI in software development with Tenable One.
تعرّف على Tenable Hexa AI: الذكاء الاصطناعي الوكيل لإدارة التعرض للمخاطر
تعرّف على Tenable Hexa AI: المحرك الوكيل لمنصة Tenable One Exposure Management Platform. تعرّف على كيفية قيام Tenable Hexa AI بأتمتة عمليات سير العمل الأمنية المعقدة، وتحويل التحليل الذكي لحالات التعرض للمخاطر إلى إجراءات منسقة لمساعدة فرق الأمن لديك على تقليل المخاطر الإلكترونية بشكل فعال.
The hidden cost of AI speed: Unmanaged cyber risk
AI isn’t just moving fast. It’s creating new attack paths. Cyber teams must now manage vulnerabilities – and their ramifications throughout their IT environments – in AI tools deployed without enough governance guardrails. The answer for securing this new attack surface? Unified exposure management.
Bolster your defenses and close the code-to-cloud gap with Tenable and OX
Today, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenable and OX helps you close the code-to-cloud gap from development through runtime. By combining CNAPP with deep AppSec, this integration is…
Don't confuse asset inventory with exposure management
Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can't connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don't have exposure management. You have inventory.
Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
Microsoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released.
President Trump's Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
President Trump's Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience.
مصيدة السحابة وسرعة الذكاء الاصطناعي: لماذا تتخلف الحوكمة عن ركب الابتكار
اعتماد الذكاء الاصطناعي يفوق الحوكمة الإلكترونية التقليدية. يكشف "تقرير المخاطر الأمنية للحوسبة السحابية والذكاء الاصطناعي لعام 2026" الصادر عن شركة Tenable عن كيفية أن الهويات ذات الصلاحيات المفرطة وتبعيات سلسلة التوريد غير الخاضعة للمراقبة تترك المؤسسات مكشوفة. نقدم لك 10 تكتيكات لإغلاق مسارات الهجوم الأكثر خطورة.
From Clawdbot to Moltbot to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
Moltbot, the viral AI agent, is riddled with critical vulnerabilities, exposed control interfaces, and malicious extensions that put users' sensitive data at risk. Understand the immediate security practices you can implement to mitigate this enormous agentic AI security risk.
استعراض Tenable One AI Exposure: معيار جديد لتأمين استخدام الذكاء الاصطناعي على نطاق واسع
يمكنك اكتشاف جميع استخدامات الذكاء الاصطناعي ومراقبتها باستمرار عبر مؤسستك، بما في ذلك الاستخدام غير المُصرح به للذكاء الاصطناعي والوكلاء والمكونات الإضافية للمتصفح وغير ذلك، باستخدام أداة Tenable One AI Exposure. إذ يمكنك تخطيط عمليات سير العمل المعقدة للذكاء الاصطناعي، للكشف عن حالات التعرض للمخاطر عالية التأثير ومراقبة الامتثال للسياسات الأمنية وسياسات الاستخدام المقبول للذكاء الاصطناعي.