EPA Issues Cybersecurity Regulations for Public Water Systems: How Tenable Can HelpMarch 27, 2023
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help.
What's New in Tenable OT Security: Superior IT/OT/IoT Asset Discovery, Advanced Threat Detection and MoreMarch 9, 2023
Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk.
The Challenges of Multi-Cloud ComplianceMarch 9, 2023
Organizations that use public clouds like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) understand that each platform does things its own way, and those differences create challenges for securing them all. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenges and how Tenable Cloud Security can help. Check out the highlights of our discussion.
Why Third-Party Tools Are Best for Multi-Cloud CSPMFebruary 23, 2023
Cloud security posture management enables organizations using multiple public cloud platforms like AWS, Azure and GCP to see everything they have running and where their security risks lie. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenges and how Tenable Cloud Security can help. Check out the highlights of our discussion.
Navigating Federal Cybersecurity Recommendations for Public Water Utilities: How Tenable Can HelpFebruary 14, 2023
Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and how Tenable can help.
How to Extract Data and Value from Tenable’s EASM SolutionFebruary 8, 2023
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data.
How Analyzing External Attack Surface Data Boosts Your Security StrategyJanuary 26, 2023
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely.
Tenable.sc 6.0: A Major Update that Boosts Visibility and ProductivityJanuary 25, 2023
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a global CVE search to help them focus their RBVM efforts on what’s most important.
Active Directory Vulnerabilities: How Threat Actors Leverage AD Flaws in Ransomware AttacksNovember 30, 2022
Adopting a proactive stance will give enterprises the head start to shut down new threats to Active Directory whenever they are uncovered.
Tenable.io: To control or not to control, that is the questionOctober 10, 2022
For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to implement RBAC successfully.
Introducing the Tenable One Exposure Management PlatformOctober 4, 2022
Anticipate likely attacks. Proactively reduce your exposure. Communicate with your key stakeholders.
Exposure Management: Reducing Risk in the Modern Attack SurfaceOctober 4, 2022
Cybersecurity organizations struggle with reactive and siloed security programs and with a sprawl of point tools that generate heaps of fragmented data but few insights. Here we explain why they need an exposure management platform that provides comprehensive visibility and allows them to anticipate threats, prioritize remediation and reduce risk.