The Era of Responsible Cybersecurity Finally Arrives
May 10, 2022The SEC’s proposed rule on cybersecurity promotes transparency and encourages free market forces.
How to Choose a Modern CSPM Tool to Reduce Your Cloud Infrastructure Risk
May 3, 2022Cloud Security Posture Management solutions have become a must for detecting and fixing misconfigurations in public clouds — from code to runtime.
IDC Ranks Tenable Number One in Worldwide Device Vulnerability Management Market Share for 2020
April 27, 2022The research firm’s latest report also provides market insights security professionals can use to improve their vulnerability management strategy.
Test Your Hacking Skills: Join Tenable’s Annual CTF Competition!
April 25, 2022Tenable launches the 2022 Capture the Flag event for the security community, running from June 9-13. Get ready to test your hacking skills, practice new ones and see how you measure up against othe...
You’ve Migrated Business-Critical Functions to the Cloud…Now What?
April 20, 2022An expanding attack surface demands a robust cybersecurity strategy. Here’s what you need to know.
Securing Critical Infrastructure: It's Complicated
April 5, 2022In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can help.
CNAPP: What Is It and Why Is It Important for Security Leaders?
March 3, 2022A Cloud-Native Application Protection Platform (CNAPP) offers four key benefits to reduce risk and improve visibility. Here’s what you need to know.
Tenable’s Acquisition Of Cymptom: An “Attack Path-Informed” Approach to Cybersecurity
February 17, 2022Tenable’s recent acquisitions all had the same overarching goal: helping our customers gain better security insights across their cyberattack surface.
Log4Shell: A Tale of Two Detection Techniques
February 15, 2022Endpoint detection and response (EDR) can only take you so far in identifying Log4j exploit attempts. Here’s why dynamic checks are needed to uncover vulnerable versions of Log4j.
What Is IaC and Why Does It Matter to the CISO?
February 1, 2022Many vendors and security companies are buying or building Infrastructure as Code (IaC) security into their portfolios, and this trend is only expected to continue. Here’s what you need to know. In...
Securing Critical Infrastructure: The Essential Role of Public-Private Partnerships
January 31, 2022Government collaboration with industry can help drive strategic planning and tactical operations to address cyberthreats. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) states, “P...
A Holiday Story, Internet Edition: The Impact Of Assessing And Addressing Log4j Installations Proactively
December 30, 2021A look at our log4j data.