Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

July 28, 2025

Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market

Tenable customers have spoken: Here’s what they’re saying about our products.

February 1, 2023

حان وقت مساعدة الحكومة الأمريكية لقارة أفريقيا في تعزيز الأمن الإلكتروني

African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. ...


February 1, 2023

How Attackers Can Exploit GCP’s Multicloud Workload Solution

A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations....


January 31, 2023

ProxyNotShell، وOWASSRF، وTabShell: صحح Microsoft Exchange Servers الخاصة بك الآن

Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended....


January 30, 2023

Tenable Cyber Watch: كيف يشعر الرؤساء التنفيذيون لأمن المعلومات حيال وظائفهم، ولماذا يعاني المطورون مع الأمان، واستخدام الذكاء الاصطناعي في الحد من المخاطر

This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back.  Ever wonder how happy your CISO is at ...


January 27, 2023

Sandworm APT تنشر برنامج SwiftSlicer Wiper باستخدام سياسة مجموعة Active Directory

Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer....


January 27, 2023

Cybersecurity Snapshot: فشل مُورِّدي إنترنت الأشياء في عمليات الكشف عن الثغرات الأمنية، في حين تحتل التهديدات الإلكترونية من جديد صدارة مخاطر الأعمال 

Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!...


January 26, 2023

كيف يعزز تحليل بيانات سطح الهجوم الخارجي إستراتيجية الأمان الخاصة بك 

Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....


January 25, 2023

Tenable.sc 6.0: تحديث رئيسي لتعزيز الرؤية والإنتاجية

Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...


January 23, 2023

Tenable Cyber Watch: الأمن الإلكتروني من بين أهم 10 مخاطر عالمية في المنتدى الاقتصادي العالمي، والمخاوف الإلكترونية لا تزال تُعيق القيمة السحابية، وغير ذلك الكثير

We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity.  Happy Monday! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, t...


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

نظرة على نظام فيروس الفيدية

تنزيل التقرير >