Tenable 블로그
사이버 보안 스냅샷: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices

Securing the AI Attack Surface: Separating the Unknown from the Well Understood
There's a lot of confusion and unknowns regarding AI application risks, and a lot of vendors are trying to offer solutions to problems that aren't clearly defined. In this blog we explain why a smart approach is to start by focusing on basic, foundational cyber hygiene, adopt well-established best p...
Do You Think You Have No AI Exposures? Think Again
As AI usage becomes more prevalent in organizations globally, security teams must get full visibility into these applications. Building a comprehensive inventory of AI applications in your environment is a first step. Read on to learn what we found about AI application-usage in the real world when w...
Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach
As AI transforms industries, security remains critical. Discover the importance of a security-first approach in AI development, the risks of open-source tools, and how Tenable's solutions can help protect your systems....
Your Exposure Ends Here: Introducing the New Tenable Brand
At Tenable, our mission is to manage and reduce cyber risk, because cyber risk is business risk. Feedback from dozens of top CISOs is reflected in our latest brand evolution. Tenable is the exposure management company that helps customers know where their weaknesses lie, expose their risk and close ...
데이터에서 작업으로 전환: 인텔리전스 기반 취약성 관리
컨텍스트에 따라서 취약성의 우선 순위를 지정하는 것은 항상 취약성 관리 팀에게 도전 과제였으며 게시된 CVE의 수가 계속 증가하고 있으므로 이 작업은 더 쉬워지지 않을 것입니다. To remedy this, many enterprises are forced to invest in products and services to protect their environments with various ...
사이버 보안 스냅샷: Data Breach Costs Rise, as Ransomware Attacks Fall, Reports Find
IBM’s latest “Cost of a Data Breach Report” finds these data-theft incidents getting more expensive. Plus, the IT-ISAC says that ransomware attacks fell in Q2 due to law-enforcement disruptions of ransomware groups. Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI system securi...
Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization
As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help....
EU AI Act: Will your company be the next to face the average €20 million fine for violating the regulation?
The European Union Artificial Intelligence Act includes specific provisions to ensure the cybersecurity of high-risk AI systems. We break down key elements of the ruling and offer guidance on how to prepare your organization....
Cyentia 및 FIRST의 연구에 의하면 EPSS는 익스플로잇 예측에서 강력한 성과를 증명
Tenable sponsored research from Cyentia and FIRST, which finds that while vulnerability exploitation is highly variable, EPSS is getting stronger in its ability to predict exploitation. ...