Avoiding the Security Potluck: Good Governance Helps You from Code to Cloud
What's involved in shifting cloud security responsibilities to the app development team with governance by the security team?
What's New in Tenable OT Security 3.16: Elevating Building Management System Security and User Experience
Tenable OT Security 3.16 introduces advanced security for building automation systems, a streamlined interface and simplified upgrade process, empowering users to be at the forefront of securing their IT, OT, BMS and IoT assets with confidence.
كيفية الحصول على تأمين الأمن الإلكتروني المناسب لعملك
Cyber insurance has become a necessity, and the cost and effort to obtain it can be considerable. Still, your organization can boost its odds of landing the coverage it needs at a fair price that’s consistent with its risk profile. Check out the invaluable advice from a panel of experts from the…
الأمن البحري للتكنولوجيا التشغيلية: أمطار عاصفة أم إبحار سلس؟
The maritime industry is navigating a sea of change when it comes to cybersecurity. The interconnected vessels and new technologies enabling the shipping world to become more efficient also introduce cyber risk. Here's what you need to know about the challenges and risks these floating cities face …
How Exposure Management Can Make Pen Testing More Effective
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
طريقة عملية لتقليل المخاطر في منطقة الإنتاج
هناك الكثير من الصخب حول الأمن الإلكتروني لمنطقة الإنتاج في مجال التصنيع، ولكن من أين تبدأ؟ دعونا نُبسط الأمر ونتطرق إلى سبب قيام المهاجمين بما يفعلونه وما يمكنك فعله لإيقافهم. يتعلق الأمر برمته بتقليل المخاطر، ومضاعفة جهودك لتحقيق أفضل النتائج. Read on to learn…
Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development
With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of…
How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines
Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.
تغير اسم منتج Tenable وتطور العلامة التجارية لـ Tenable
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer.
The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how…
يوفر تكامل Tenable Security Center في Tenable One إدارة تعرض للمخاطر كاملة للعملاء في مكان العمل
With the integration of Tenable Security Center into Tenable One, Tenable becomes the only vendor to offer exposure management for both on-premises and hybrid deployment models. Here’s what you need to know.
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.