Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

February 12, 2026

O Gartner® nomeou a Tenable em um relatório de 2025 como a atual “Company to Beat” (empresa a ser superada) em avaliação de exposição com tecnologia de IA

“A cobertura de ativos e superfícies de ataque da Tenable, sua aplicação de IA e sua reputação na avaliação de vulnerabilidades fazem dela a líder na avaliação de exposição baseada em IA”, o Gartner afirma em “AI Vendor Race: Tenable Is the Company to Beat for AI-Powered Exposure Assessment”.

March 25, 2024

Como aprimorar a segurança cibernética e o gerenciamento de frota no transporte para o DoD

Few things can halt operations across the Department of Defense like a critical failure of logistics and transportation. From automated asset inventory to malicious-activity detections through baselining, learn how Tenable OT Security can protect these critical functions within the DoD and work…


March 22, 2024

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Check out the NSA’s 10 key best practices for securing cloud environments. Plus, learn how cloud native computing could help streamline your AI deployments. Meanwhile, don’t miss the latest about cyberthreats against water treatment plants and critical infrastructure in general. e muito mais.


March 21, 2024

FlowFixation: Serviço do Apache Airflow da AWS assume a vulnerabilidade, e por que negligenciar as proteções coloca os principais CSPs em risco

Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of…


March 20, 2024

Como proteger seus ativos de TI, OT e IoT com uma plataforma de gerenciamento de exposição: visibilidade completa com inventário e descoberta de ativos

Explore como o Tenable One para OT/IoT ajuda as organizações a permanecerem à frente no atual cenário de ameaças em constante evolução, com visibilidade completa e priorização de riscos cibernéticos em TI, OT e IoT.


March 19, 2024

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters…


March 19, 2024

Atrasos recentes no NVD não afetarão os clientes do Tenable Vulnerability Management graças às nossas diversas fontes de pontuação

NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable Vulnerability Management customers because our vulnerability scoring is based on multiple sources.


March 18, 2024

Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment

Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges…


March 18, 2024

Como identificar envenenamento de cache da web e armadilha de cache da web: How Tenable Web App Scanning Can Help

Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some common attack paths are so challenging to mitigate and how Tenable Web App Scanning can help.


March 15, 2024

Cybersecurity Snapshot: CISA destaca a segurança na nuvem e a integração dos sistemas de IAM híbridos

Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against Microsoft. And don’t miss the latest CIS Benchmarks. e muito mais.


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.