مدونة Tenable
Why Early Visibility Matters: Risk Lurks in the Vulnerability Disclosure Gaps
Relying on EDR for Exposure Management? Here’s What You Need to Know
Endpoint detection and response tools may serve you well when it comes to handling incident response. But, when used for exposure management, they can leave you blind to large portions of your attack surface.
Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find
Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.
إدارة التعرض للمخاطر خارج حدود نقطة النهاية
يمكن أن يؤدي الاعتماد على نهج يركز على نقطة النهاية في إدارة التعرّض للمخاطر إلى ترك نقاط عمياء لديك تزيد من مستوى المخاطر. لذلك كان لزامًا عليك أن ترى بيئتك كما يراها المهاجم.
لا تدع أمن السحابة لديك ينهار بسبب تسلل الصلاحيات
غالباً ما تكون فرق الأمن السحابي غير مدركة لأحد أكبر التهديدات التي تواجه البيئات السحابية: وهي شبكة من الهويات ذات الصلاحيات المفرطة التي تُنشئ مسارات للمهاجمين. اكتشف كيف يمكنك استعادة السيطرة على هوياتك السحابية من خلال أتمتة فرض مبدأ الامتيازات الأقل عبر بيئتك.
How Exposure Management Helped Three Companies Transform Their Cybersecurity Program
Part two of our Exposure Management Academy series on exposure management maturity explores how organizations like Drogaria Araujo, Tenable and Verizon have applied exposure management to strengthen their security postures.
CVE-2025-61882: Frequently Asked Questions About Oracle E-Business Suite (EBS) Zero-Day and Associated Vulnerabilities
Following reports the Cl0p ransomware group has been extorting Oracle E-Business Suite customers, Oracle released an advisory for a zero-day that was exploited in the wild.
Cybersecurity Snapshot: Cybersecurity Awareness Month Arrives To Find AI Security a Hot Mess, as New OT Security Guidelines Highlight Architecture Mapping
As we kick off Cybersecurity Awareness Month, AI security challenges take the spotlight. Meanwhile, new marching orders say OT security teams need a comprehensive view of their systems. And get the latest on post-quantum computing standards and on a fresh batch of CIS Benchmarks!
The Buy Vs. Build Dilemma: Pitfalls of the DIY Approach to Exposure Management
Some security teams are taking a do-it-yourself approach to exposure management, according to a recent study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable. But are they really ready for the hidden costs and challenges that come with a homegrown system?
The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration
Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to: search-injection attacks on its Search Personalization…