Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

October 3, 2025

Cybersecurity Snapshot: Cybersecurity Awareness Month Arrives To Find AI Security a Hot Mess, as New OT Security Guidelines Highlight Architecture Mapping

As we kick off Cybersecurity Awareness Month, AI security challenges take the spotlight. Meanwhile, new marching orders say OT security teams need a comprehensive view of their systems. And get the latest on post-quantum computing standards and on a fresh batch of CIS Benchmarks!

September 18, 2025

What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience

Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows and gain deeper visibility across workloads,…


September 18, 2025

How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk

Wondering what your peers think of exposure management? New reports from the Exposure Management Leadership Council, a CISO working group sponsored by Tenable, offer insights.


September 18, 2025

Who Owns Threat and Exposure Management in Your Organization?

A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future — discover what ‘good’ looks like and how to get there.


September 17, 2025

How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381

Tenable Research recently discovered that the original patch for a critical vulnerability affecting BentoML could be bypassed. In this blog, we explain in detail how we discovered this patch bypass in this widely used open source tool. The vulnerability is now fully patched.


September 16, 2025

القضاء على النقاط العمياء: تحقيق رؤية شاملة لدورة حياة تطوير البرمجيات (SDLC) في عالم متعدد السُحب

هل تواجه صعوبة للتحكم في بيئة فوضوية متعددة السُحب؟ اكتشف كيف يساعدك نهج Tenable لأمان السحابة الموحّد على التخلص من النقاط العمياء الخطيرة، وتحقيق رؤية وتحكّم كاملين، وتأمين أصولك بدءًا من أول سطر في التعليمات البرمجية وحتى مرحلة الإنتاج الكامل.


September 16, 2025

IDC Ranks Tenable #1 in WW Device Vulnerability and Exposure Management Market Share

Tenable’s market share leadership in Worldwide Device Vulnerability and Exposure Management is a testament to the trust tens of thousands of customers place in Tenable One every day. Our placement also marks seven consecutive years at #1.


September 15, 2025

How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable

A complete and detailed operational technology (OT) asset inventory and taxonomy are not only the foundation of a defensible security posture, they’re also essential for resilient operations. Here’s a breakdown of CISA's latest OT guidance with details on how Tenable can help you turn it into…


September 15, 2025

Exploring the Exposure Management Maturity Model

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In the first of a two-part blog series, Tenable’s Pierre Coyne guides you through the Tenable Exposure Management Maturity Model.


September 12, 2025

Cybersecurity Snapshot: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future

Check out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures!


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

نظرة على نظام فيروس الفيدية

تنزيل التقرير >

× الاتصال بفريق المبيعات