A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations
November 22, 2022With the right ingredients, you can nail your board presentation every time. Check out these recommendations from seasoned Fortune 1000 CISOS. Presenting to the board can seem like the most dauntin...
Cybersecurity Snapshot: Insights on Log4j, Memory Attacks, Cloud Security, Ransomware
November 18, 2022Get the latest on an APT’s Log4Shell exploit; tips to prevent memory attacks; cloud security trends; metaverse security; and more!
Translating OT Security Recommendations into U.S. Policy Outcomes
November 15, 2022A recent NSTAC report to the president outlined additional strategies to secure the convergence of information technology and operational technology.
Cybersecurity Snapshot: Insights on Supply Chain Security, Hiring, Budgets, K8s, Ransomware
November 11, 2022Get the latest on staffing challenges; nation-state assaults on critical infrastructure; supply chain security tips; ransomware weak links; Kubernetes security; and more!
Shift left: Still a Work in Progress
November 8, 2022Experts say “shift left” practices are falling short. Here’s what you need to know and what you can do about it. Researchers are calling on companies to do a better job of educating developers abou...
Cybersecurity Snapshot: Salary Trends, Ransomware Summit, Next-gen MFA
November 4, 2022Get the latest on salary trends for CISOs and cybersecurity pros; CISA’s call for adopting phishing-resistant MFA; the White House’s ransomware summit; and more!
Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations
October 28, 2022Get the latest on Microsoft 365 security configurations; effective CISO board presentations; rating MSPs’ cybersecurity preparedness; and hospitals’ Daixin cyberthreat.
To Boost Software Supply Chain Security, Stop the Finger-Pointing
October 27, 2022Google’s annual DevOps report finds that organizations with a low-blame, collaborative approach have stronger app dev security practices.
Cybersecurity Snapshot: 6 Things That Matter Right Now
October 21, 2022Topics that are top of mind for the week ending Oct. 21 | The problem with Gen Zers and Millennials | Global shortage of cybersecurity pros worsens | An informal poll about attack surface growth | Password usage drops a bit | And much more!
Exposure Management: Our Vision for Securing the Modern Attack Surface
October 20, 2022Securing today's complex and dynamic IT environments requires bringing together vulnerability management, web application security, cloud security, identity security, attack path analysis and external attack surface management to help you understand the full breadth and depth of your exposures.
Three U.S. Policy Recommendations to Strengthen OT Cybersecurity
October 19, 2022A presidential advisory committee report outlined strategies to improve government asset visibility, procurement and information sharing to enhance operational technology (OT) cybersecurity practices.
How Tenable Helps Federal Agencies Meet CISA’s Binding Operational Directive 23-01
October 18, 2022Here’s how to leverage Tenable solutions to achieve compliance with BOD 23-01 from the Cybersecurity and Infrastructure Security Agency (CISA).