Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

August 1, 2025

Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

September 20, 2023

تم اختيار شركة Tenable كشركة رائدة في إدارة مخاطر الثغرات الأمنية من قبل شركة أبحاث مستقلة

“Tenable sets the tone for proactive security,” according to the Forrester Wave™: Vulnerability Risk Management, Q3 2023...


September 18, 2023

مشاهدة Tenable Cyber: الولايات المتحدةحث صناعة الفضاء على البقاء يقظة، وتصبح الوظائف السيبرانية أكثر صرامة، والمزيد

This week’s edition of Tenable Cyber Watch unpacks safeguarding the US space industry and addresses why many cyber pros feel their jobs have gotten more difficult. Also covered: Three quantum-resistant algorithms that can protect data from quantum computer attacks....


September 15, 2023

Cybersecurity Snapshot: اطلع على أحدث تهديدات Deepfake، والمخاطر مفتوحة المصدر، وأمن نظام الذكاء الاصطناعي، وعصابات فيروس الفدية

Tasked with securing your org’s new AI systems? Check out a new Google paper with tips and best practices. Plus, open source security experts huddled at a conference this week – find out what they talked about. Also, Uncle Sam says it’s time to prep for deepfake attacks. And much more!...


September 12, 2023

شراكة Tenable وCyversity في برنامج إعداد امتحان CISSP

Tenable is now accepting applicants for its training scholarship dedicated to supporting cybersecurity professionals from diverse backgrounds in their preparation for the CISSP exam Diversity, equity and inclusion (DEI) is a priority at Tenable. We strive to be a career destination in which individ...


September 12, 2023

مشاهدة Tenable Cyber: قادة الإنترنت يعطون الأولوية للاكتشاف والوقاية، وأهم 3 برامج ضارة في الربع الثاني، والمزيد

This week’s edition of Tenable Cyber Watch unpacks security leaders' top cybersecurity priorities and addresses why software products must be secure by design. Also covered: The top 3 malware in Q2. ...


September 12, 2023

كيفية إجراء تقييمات فعالة للثغرات الأمنية باستخدام Tenable

Policy configuration choices in vulnerability assessment tools like Tenable Nessus, Tenable Security Center and Tenable Vulnerability Management enable security professionals to effectively gather data that can be analyzed to aid in prioritizing remediation....


September 11, 2023

CVE-2023-20269: تم الإبلاغ عن استغلال ثغرة أولية مباغتة (Zero-Day) في جهاز أمان Cisco Adaptive وFirepower Threat Defense من قبل مجموعات فيروس الفيدية

Ransomware groups including LockBit and Akira are reportedly exploiting a zero-day vulnerability in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances with VPN functionality enabled....


September 11, 2023

The Azure Metadata Protection You Didn’t Know Was There

Some Azure services have an additional, not widely known, protection mechanism against session token exfiltration....


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

نظرة على نظام فيروس الفيدية

تنزيل التقرير >