Blog da Tenable
Breaking Down Silos: Why You Need an Ecosystem View of Cloud Risk

In Cybersecurity, We Have to Work Together
The future of cybersecurity depends on open, collaborative platforms that bring the industry's best solutions together.
How Exposure Management Moves Beyond Vulnerability Scans to A Unified View of Risk
Todas as segundas-feiras, a Tenable Exposure Management Academy fornece a orientação prática e real de que você precisa para mudar do gerenciamento de vulnerabilidades para o gerenciamento de exposição. In this post, we look at the results of a survey taken during a recent Tenable webinar on the level of familiarity with exposure…
Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation;…
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight
Learn how Thales Cyber Services uses Tenable to help customers navigate the maturity levels of the Essential Eight, enabling vulnerability management and staying ahead of cyber threats.
Identity is the New Perimeter: Why Your IdP Isn’t Enough
In a cloud-first world, identity is one of the most critical layers of security. While organizations are making progress using IdPs, major identity protection gaps remain.
Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market
Tenable customers have spoken: Here’s what they’re saying about our products.
The Keys to Implementing Exposure Management
Todas as segundas-feiras, a Tenable Exposure Management Academy fornece a orientação prática e real de que você precisa para mudar do gerenciamento de vulnerabilidades para o gerenciamento de exposição. In this post, we look at the results of a survey taken during a recent Tenable webinar on hesitations around exposure management.
Cybersecurity Snapshot: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan
Check out the latest on attackers’ cyber siege of SharePoint servers. Plus, the White House releases plan to spur AI innovation. In addition, CISA alerts orgs about Interlock ransomware. And get the latest on Q2's top malware; ransomware trends; and credentialed scanning.
Como reduzir o foco: melhorias do VPR da Tenable e como ele se compara a outros modelos de priorização
A Tenable está lançando uma série de melhorias no Vulnerability Priority Rating (VPR), incluindo threat intel enriquecida, perspectivas e explicabilidade orientadas por IA e metadados contextuais. Learn how the improved prioritization effectiveness of the enhanced VPR compares to other common…