Blog da Tenable
Tackling Shadow AI in Cloud Workloads

Cybersecurity Snapshot: U.K. NCSC’s Best Cyber Advice on AI Security, the Quantum Threat, API Risks, Mobile Malware and More
In this special edition of the Cybersecurity Snapshot, we bring you some of the most valuable guidance offered by the U.K. National Cyber Security Centre (NCSC) in the past 18 months. Check out best practices, recommendations and insights on protecting your AI systems, APIs and mobile devices, as we...
Do gerenciamento de vulnerabilidades a gerenciamento de exposição: a mudança crítica que você não pode ignorar
Vulnerability management remains core to reducing cyber risk — but as the attack surface grows, teams need a risk-driven strategy that looks beyond vulnerabilities to see the bigger picture. Discover how exposure management unifies data and prioritizes real exposures — keeping teams proactive and ah...
Segurança da nuvem mais forte em cinco etapas: proteja suas identidades na nuvem
After covering cloud security posture management (CSPM) and cloud workload protection (CWP) in the first two installments of Tenable’s “Stronger Cloud Security in Five” blog series, today we focus on securing your cloud identities. Protecting them is a tall order, but it’s critical because identitie...
Frequently Asked Questions about Vibe Coding
Vibe coding has attracted much attention in recent weeks with the release of many AI-driven tools. This blog answers some of the Frequently Asked Questions (FAQ) around vibe coding....
Como o gerenciamento de exposição pode aliviar o problema da proliferação de ferramentas de segurança
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, the first of two parts, we explore how exposure management can help ease the pain of having too many siloed security ...
Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and More
In this special edition of the Cybersecurity Snapshot, we’re highlighting some of the most valuable guidance offered by the U.S. Cybersecurity and Infrastructure Security Agency in the past 12 months. Check out best practices, recommendations and insights on protecting your cloud environments, OT sy...
Injeção imediata de MCP: Não apenas para o mal
MCP tools are implicated in several new attack techniques. Here's a look at how they can be manipulated for good, such as logging tool usage and filtering unauthorized commands....
O futuro do gerenciamento de acesso à nuvem: como o Tenable Cloud Security redefine o acesso Just-in-Time
As abordagens tradicionais de acesso à nuvem dependem de permissões estáticas e permanentes que, muitas vezes, são superprivilegiadas. Saiba como o acesso Just-in-Time muda completamente o jogo....
O gerenciamento de exposição funciona quando o CIO e o CSO estão em sincronia
Todas as segundas-feiras, a Tenable Exposure Management Academy fornece a orientação prática e real de que você precisa para mudar do gerenciamento de vulnerabilidades para o gerenciamento de exposição. Nesta publicação, a CIO da Tenable, Patricia Grant, analisa como o relacionamento CIO/CSO é fundamental para um programa de gerenciamento de exposição bem-sucedido. ...