Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

October 10, 2025

Cybersecurity Snapshot: AI Security Skills Drive Up Cyber Salaries, as Cyber Teams Grow Arsenal of AI Tools, Reports Find

Want recruiters to show you the money? A new report says AI skills are your golden ticket. Plus, cyber teams are all in on AI, including agentic AI tools. Oh, and please patch a nasty Oracle zero-day bug ASAP. And get the latest on vulnerability management, IoT security and cyber fraud.

May 25, 2023

Volt Typhoon: International Cybersecurity Authorities Detail Activity Linked to Chinese-State Sponsored Threat Actor

Several international cybersecurity authorities from the United States, United Kingdom, Australia, Canada and New Zealand issue a joint advisory detailing tactics, techniques and procedures used in recent attacks by a Chinese state-sponsored threat actor.


May 24, 2023

Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development

With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of…


May 23, 2023

Como o Tenable Identity Exposure ajuda você a seguir as mais recentes diretrizes de Zero Trust da CISA

Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.


May 22, 2023

Tenable Cyber Watch: Como proteger computadores quânticos contra ataques cibernéticos, gerenciamento de vulnerabilidades de IA, e mais

This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors.


May 19, 2023

Cybersecurity Snapshot: Enquanto o chefão da OpenAI confronta o congresso americano, o clima esquenta na regulamentação da IA.

Check out what OpenAI’s CEO told lawmakers in Congress about regulating AI. Meanwhile, an upcoming EU law could cramp ChatGPT’s style. Also, the public’s nail biting over AI is real. In addition, a new AI chatbot may soon answer your burning questions about the dark web. e muito mais.


May 18, 2023

Agências da Austrália e dos EUA publicam aviso conjunto de segurança cibernética sobre grupo BianLian Ransomware

The FBI, ACSC and CISA have released a joint cybersecurity advisory discussing the BianLian ransomware group.


May 15, 2023

Alterações no nome do produto da Tenable e a evolução da marca da Tenable

Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. 


May 15, 2023

Tenable Cyber Watch: Casa Branca divulga investimento de $140M em IA responsável, Top 5 Malwares do primeiro trimestre de 2023, e mais

This week’s edition of the Tenable Cyber Watch unpacks the White House’s $140 million dollar investment into AI research and development and explores the security implications of ChatGPT. Also covered: The top 5 malware strains for Q1 2023.


May 12, 2023

Cybersecurity Snapshot: Como aumentar a confiança dos clientes nos seus serviços digitais

Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. e muito mais.


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

Análise do ecossistema de ransomware

Fazer download do relatório >

× Entre em contato com nossa equipe de vendas