What’s new in Tenable Cloud Security: Custom policies, AWS ABAC, and research-driven protection
Stop the noise and scale your cloud security. Our latest updates introduce custom policy automation via Explorer, AWS ABAC support for true least privilege, and research-backed protection against critical vulnerabilities, all designed to slash MTTR without disrupting your DevOps workflows.
Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection
Tenable One's new Model Refusal Detection turns an LLM's refusal to execute a risky or suspicious prompt into a high-fidelity early warning signal. It helps you uncover and stop prompt injection attacks, insider threats, and other risky behaviors before they escalate into a breach.
Security for AI: A guide to managing the risks of vibe coding and AI in software development
Get a template for an AI coding acceptable use policy with security controls and a list of 25 security questions to ask software developers and “citizen developers” about their AI use. Mitigate the security risks of vibe coding and using AI in software development with Tenable One.
Tenable Hexa AI 소개: 위험 노출 관리를 위한 에이전트 AI
Tenable One - 위험 관리 노출 플랫폼의 에이전트 엔진인 Tenable Hexa AI를 소개합니다. Tenable Hexa AI가 어떻게 복잡한 보안 워크플로를 자동화하고 위험 노출 인텔리전스를 조율된 대응으로 전환하여 보안 팀이 사이버 위험을 실질적으로 줄일 수 있도록 지원하는지 알아보십시오.
The hidden cost of AI speed: Unmanaged cyber risk
AI isn’t just moving fast. It’s creating new attack paths. Cyber teams must now manage vulnerabilities – and their ramifications throughout their IT environments – in AI tools deployed without enough governance guardrails. The answer for securing this new attack surface? Unified exposure management.
Bolster your defenses and close the code-to-cloud gap with Tenable and OX
Today, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenable and OX helps you close the code-to-cloud gap from development through runtime. By combining CNAPP with deep AppSec, this integration is…
Don't confuse asset inventory with exposure management
Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can't connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don't have exposure management. You have inventory.
Microsoft’s March 2026 Patch Tuesday Addresses 83 CVEs (CVE-2026-21262, CVE-2026-26127)
Microsoft addresses 83 CVEs including two vulnerabilities that were publicly disclosed prior to a patch being released.
President Trump's Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
President Trump's Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience.
The Cloud and AI Velocity Trap: Why Governance Is Falling Behind Innovation
AI 도입의 속도는 전통적 사이버 거버넌스보다 빠릅니다. 'Tenable 클라우드 및 AI 보안 위험 보고서 2026'에서는 어떻게 권한이 과도한 ID와 모니터링되지 않는 공급망 종속성이 조직을 위험하게 만드는지 공개합니다. 가장 중요한 공격 경로를 차단하는 10개 전술을 제공합니다.
From Clawdbot to Moltbot to OpenClaw: Security Experts Detail Critical Vulnerabilities and 6 Immediate Hardening Steps for the Viral AI Agent
Moltbot, the viral AI agent, is riddled with critical vulnerabilities, exposed control interfaces, and malicious extensions that put users' sensitive data at risk. Understand the immediate security practices you can implement to mitigate this enormous agentic AI security risk.
Tenable One AI Exposure 소개: 대규모 AI 사용 보안에 대한 새로운 표준
Tenable One AI Exposure를 사용하여 섀도 AI, 에이전트, 브라우저 플러그인 등을 포함한 조직 전반의 모든 AI 사용을 지속적으로 파악하고 모니터링할 수 있습니다. 복잡한 AI 워크플로를 매핑하여 큰 영향을 미치는 위험 노출을 알아보고 보안 및 AI 사용 제한 정책의 준수를 모니터링하십시오.