Securing Federal Cloud Environments: Overcoming 5 Key Challenges with Tenable Cloud Security
U.S. government agencies face unique challenges as they adopt cloud technologies to meet digital modernization initiatives and adhere to a cloud-first policy. Here’s how Tenable Cloud Security FedRAMP can help.
Identifying and Securing AI Workloads
Learn why AI workloads demand a new approach to cloud security.
What’s New in Tenable Cloud Security: November Updates in Exposure Management
Tenable Cloud Security delivers critical capabilities to unify security across your entire attack surface. Our latest enhancements let you extend your on-prem vulnerability management program to the cloud; gain granular visibility into external access risk; and discover Snowflake sensitive data.
From Brittle to Scalable: AWS Boosts VPC Perimeter Security with New IAM Keys
AWS has released three new IAM condition keys for VPC endpoints to strictly limit access by specific accounts, organizational units, or AWS Organizations. Learn how these keys help you build scalable security perimeters and reduce manual policy maintenance.
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
Context is key for protecting data in the cloud. Learn how an integrated CNAPP approach moves beyond basic DSPM and takes into account identities, misconfigurations, and AI workloads to pinpoint the greatest risks to your cloud data.
Tenable Cloud Vulnerability Management: الحد من مخاطر الثغرات الأمنية في عصر السحابة
أطلقت Tenable منتج Tenable Cloud Vulnerability Management، وهو عرض جديد قوي ضمن منصة Tenable One؛ لمساعدة قادة إدارة الثغرات الأمنية على تحديد حالات التعرض للمخاطر وتحديد أولوياتها ومعالجتها عبر البيئات السحابية المتعددة والهجينة.
What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation
We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.
الحد من نطاق تأثير الثغرات الأمنية في السحابة
يوحّد حل Tenable Cloud Security الرؤية عبر مراحل التعليمات البرمجية والبناء ووقت التشغيل. ويربط بين الثغرات الأمنية والهويات والتكوينات غير الصحيحة لتحديد أولويات الاستغلال وأتمتة الاحتواء، مما يساعد الفرق على اكتشاف المخاطر والتحكم فيها ومعالجتها عبر البيئات متعددة السُحب والبيئات الهجينة.
Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD
As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce risk, meet compliance, and modernize security
Tenable Recognized as a CTEM Leader in Latio’s 2025 Cloud Security Market Report
Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty.
لا تدع أمن السحابة لديك ينهار بسبب تسلل الصلاحيات
غالباً ما تكون فرق الأمن السحابي غير مدركة لأحد أكبر التهديدات التي تواجه البيئات السحابية: وهي شبكة من الهويات ذات الصلاحيات المفرطة التي تُنشئ مسارات للمهاجمين. اكتشف كيف يمكنك استعادة السيطرة على هوياتك السحابية من خلال أتمتة فرض مبدأ الامتيازات الأقل عبر بيئتك.
The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration
Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to: search-injection attacks on its Search Personalization…
