الأمن البحري للتكنولوجيا التشغيلية: أمطار عاصفة أم إبحار سلس؟
The maritime industry is navigating a sea of change when it comes to cybersecurity. The interconnected vessels and new technologies enabling the shipping world to become more efficient also introduce cyber risk. Here's what you need to know about the challenges and risks these floating cities face …
How Exposure Management Can Make Pen Testing More Effective
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
طريقة عملية لتقليل المخاطر في منطقة الإنتاج
هناك الكثير من الصخب حول الأمن الإلكتروني لمنطقة الإنتاج في مجال التصنيع، ولكن من أين تبدأ؟ دعونا نُبسط الأمر ونتطرق إلى سبب قيام المهاجمين بما يفعلونه وما يمكنك فعله لإيقافهم. يتعلق الأمر برمته بتقليل المخاطر، ومضاعفة جهودك لتحقيق أفضل النتائج. Read on to learn…
Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development
With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of…
How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines
Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.
تغير اسم منتج Tenable وتطور العلامة التجارية لـ Tenable
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer.
The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how…
يوفر تكامل Tenable Security Center في Tenable One إدارة تعرض للمخاطر كاملة للعملاء في مكان العمل
With the integration of Tenable Security Center into Tenable One, Tenable becomes the only vendor to offer exposure management for both on-premises and hybrid deployment models. Here’s what you need to know.
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.
Protecting Local Government Agencies with a Whole-of-State Cybersecurity Approach
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…
Agents vs. Agentless: Which Solution Is Right for Your Public Cloud Environment?
You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report…
TSA, FAA Requirements Emphasize Cybersecurity for Airport and Aircraft Operators and Airport Terminal Projects: How Tenable Can Help
The TSA and FAA are making cybersecurity a priority for airport and aircraft operators and for airport terminal projects to prevent disruption and degradation to their infrastructure. Here's what you need to know — and how Tenable can help.