Blog da Tenable
O Gartner® nomeia a Tenable como a atual empresa a ser batida para avaliação de exposição com tecnologia de IA em um relatório de 2025
How To: Run Your First Vulnerability Scan with Nessus
Get your Nessus vulnerability assessment tool up and running with these five easy steps.With Nessus, you can gain full visibility into your network by conducting a vulnerability assessment. Read on as we guide you through the five steps to run your first Nessus scan. (If you have not yet installed…
Fundamentos do gerenciamento de vulnerabilidades: O que você precisa saber
Na primeira parte da nossa série de cinco partes sobre os fundamentos do gerenciamento de vulnerabilidades, exploramos as quatro fases do ciclo de vida da Cyber Exposure.
Equipes de segurança: o que você precisa saber sobre a resposta à vulnerabilidade
Tenable’s Predictive Prioritization leverages data science and machine learning to make it easier for cybersecurity teams to find, patch and remediate vulnerabilities. Week after week, critical vulnerabilities in enterprise software are found and published, sending security teams off…
Nessus Home Is Now Nessus Essentials
We’ve given Nessus Home a refresh, and we’re excited to share with you the new and updated free vulnerability assessment solution, Nessus Essentials. As part of the Nessus family, Nessus Essentials is a free vulnerability assessment solution for up to 16 IPs that provides an entry point into…
Abandone a planilha e configure o jogo de gerenciamento de suas vulnerabilidades
Passar do Nessus Pro para o Tenable.sc ou o Tenable.io pode facilmente ajudar você a amadurecer seu programa de gerenciamento de vulnerabilidades. Eis o que você precisa saber.Em algum momento, o seu fluxo de trabalho de gerenciamento de vulnerabilidades envolve uma planilha? Em caso afirmativo, você está fazendo da forma errada. Well, maybe not wrong per se, but…
Aqui estão as respostas para 16 perguntas sobre priorização preditiva
Earlier this year, Tenable introduced Predictive Prioritization, a groundbreaking, data science-based process that re-prioritizes each vulnerability based on the likelihood it will be leveraged in an attack. Here, we answer your 16 most pressing questions about what this capability …
Profissionais de segurança cibernética encaram desafios importantes na segurança de TO: Ponemon Report
62% of organizations in industries relying on operational technology experienced two or more business-impacting cyberattacks in the past 24 months, according to a report from Ponemon Institute and Tenable.If you follow cybersecurity news as avidly as we do, you already know that industrial…
Proof of Concept (PoC) vs. Proof of Value (PoV): What Do They Mean for Your Business?
This is the first of our two-part series on how to use Proof of Concept and Proof of Value processes to evaluate industrial cybersecurity solutions. Unlike Proof of Concept (PoC), which proves a concept will work, Proof of Value (PoV) takes a deeper dive into the value of that solution for…
Configuring Least Privilege SSH scans with Nessus
Editor's note (Nov. 20, 2025): The material in this blog no longer reflects current capabilities. Tenable documentation offers the latest guidance here: https://docs.tenable.com/nessus/Content/configure-least-privilege-ssh-scan.htmCredentialed scans have long been advocated as the quickest and most…