CVE-2023-34362: MOVEIt Transfer Critical Zero-Day Vulnerability Exploited in the WildJune 2, 2023
Cybersecurity Snapshot: Will AI Kill Us All? How Can You Boost Identity Security? Do You Use a Framework for Cloud Security?June 2, 2023
Check out a hair-raising warning from AI experts. Plus, find out why securing identities is getting harder than ever – and how to fix it. Also, how a cloud security framework can help you – a lot. In addition, check out nifty SaaS security tips. And much more!
Tenable Cyber Watch: OpenAI CEO Testifies Before Congress; Meet DarkBERT, New AI Trained on the Dark Web; and moreMay 29, 2023
This week’s edition of the Tenable Cyber Watch unpacks Sam Altman’s testimony before Congress on AI risks and regulations, and addresses the importance of cyberattack victims speaking up after an attack. Also covered: An introduction to DarkBERT, the only AI trained on the Dark Web.
Cybersecurity Snapshot: How Enterprise Cyber Leaders Can Tame the ChatGPT BeastMay 26, 2023
Check out a guide written for CISOs by CISOs on how to manage the risks of using generative AI in your organization. Plus, the White House unveils an updated national AI strategy. Also, a warning about a China-backed attacker targeting U.S. critical infrastructure. And much more!
Volt Typhoon: International Cybersecurity Authorities Detail Activity Linked to Chinese-State Sponsored Threat ActorMay 25, 2023
Volt Typhoon: International Cybersecurity Authorities Detail Activity Linked to Chinese-State Sponsored Threat Actor Several international cybersecurity authorities from the United States, Unit...
Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container DevelopmentMay 24, 2023
With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of Microsoft customers.
How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust GuidelinesMay 23, 2023
Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.
Tenable Cyber Watch: Protecting Quantum Computers from Cyberattacks, AI Vulnerability Management, and moreMay 22, 2023
This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors.
Cybersecurity Snapshot: As OpenAI Honcho Hits Capitol Hill, Regulatory Storm Clouds Form Over AI La La LandMay 19, 2023
Check out what OpenAI’s CEO told lawmakers in Congress about regulating AI. Meanwhile, an upcoming EU law could cramp ChatGPT’s style. Also, the public’s nail biting over AI is real. In addition, a new AI chatbot may soon answer your burning questions about the dark web. And much more!
U.S. and Australian Agencies Publish Joint Cybersecurity Advisory on BianLian Ransomware GroupMay 18, 2023
U.S. and Australian Agencies Publish Joint Cybersecurity Advisory on BianLian Ransomware Group The FBI, ACSC and CISA have released a joint cybersecurity advisory discussing the BianLian ransom...
Tenable Product Name Changes and the Evolution of the Tenable BrandMay 15, 2023
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer.
Tenable Cyber Watch: White House Unveils $140M Investment for Responsible AI, Top 5 Malware in Q1 2023, and moreMay 15, 2023
This week’s edition of the Tenable Cyber Watch unpacks the White House’s $140 million dollar investment into AI research and development and explores the security implications of ChatGPT. Also covered: The top 5 malware strains for Q1 2023.
Cybersecurity Snapshot: How To Boost Customers' Trust in Your Digital ServicesMay 12, 2023
Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. And much more!