Reinvigorating Federal Cybersecurity Post Shutdown: Tenable Supports the Cybersecurity Coalition’s Call to Action
The end of the U.S. federal shutdown is a pivotal moment to rebuild and accelerate national cybersecurity. Tenable supports the Cybersecurity Coalition's four-point plan for modernized defenses, renewed legislation, unified leadership, and revitalized collaboration.
Agentic AI Security: Keep Your Cyber Hygiene Failures from Becoming a Global Breach
The Claude Code weaponization reveals the true threat: The democratization and orchestration of existing attack capabilities. It proves that neglecting fundamental cyber hygiene allows malicious AI to execute massive-scale attacks with unprecedented speed and low skill.
A Practical Defense Against AI-led Attacks
The era of AI-driven cyberattacks is here, demonstrated by the recent abuse of an agentic AI tool in a broad espionage campaign. Defense requires a new approach centered on preemptive exposure management, combining reinforced security fundamentals with defining the new AI attack surface and…
사이버 보안 스냅샷: What Security Pros Are Saying About Exposure Management, Risk Prioritization, Tool Sprawl and More
Want to take a peek at your fellow cybersecurity practitioners’ thoughts on topics such as exposure response, patch management, and security tool sprawl? In case you missed them, we’re revisiting some of our most insightful webinar polls of 2025. Check out what your peers had to say!
Navigating Australian Cybersecurity Regulations for Critical Infrastructure Operators
Australia's critical infrastructure leaders must master a complex array of regulations and frameworks, including the SOCI Act, SLACI Act, and AESCSF. The requirements call for board-level compliance, incident reporting, and bolstering OT cyber resilience against rising geopolitical threats.
How Rapid AI Adoption Is Creating an Exposure Gap
As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it.
Tenable이 새로운 Gartner® Magic Quadrant™ for Exposure Assessment Platforms 부문에서 리더로 선정
Tenable의 고객은 위험 노출 관리가 할 수 있는 일을 증명합니다. Tenable이 고객들의 미션에 동참할 수 있도록 해주셔서 감사합니다.
사이버 보안 스냅샷: Top Advice for Detecting and Preventing AI Attacks, and for Securing AI Systems
As organizations eagerly adopt AI, cybersecurity teams are racing to protect these new systems. In this special edition of the Cybersecurity Snapshot, we round up some of the best recent guidance on how to fend off AI attacks, and on how to safeguard your AI systems.
Tenable Recognized as a CTEM Leader in Latio’s 2025 Cloud Security Market Report
Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty.
Cybersecurity Awareness Month Is for Security Leaders, Too
Think you know all there is to know about cybersecurity? Guess again. Shadow AI is challenging security leaders with many of the same issues raised by other “shadow” technologies. Only this time, it’s evolving at breakneck speed.
F5 BIG-IP Breach: 44 CVEs That Need Your Attention Now
Partnering with an EDR vendor after a nation-state has already stolen your source code isn’t innovation — it’s a gamble. You don’t build a fire extinguisher while the house is burning. You find every spark before it becomes the next inferno.Key takeaways:F5’s BIG-IP is used to secure everything…
The Human Cost of Cyber Risk: How Exposure Management Can Ease Security Burnout
The true cost of cyber risk is a human one. Siloed tools and disjointed operations aren’t just endangering your business, they’re also taking a real toll on your teams. It’s long past time to take the friction out of cybersecurity with a unified, proactive approach.