Cybersecurity Snapshot: Are SBOMs on Your Supply Chain Security Radar Screen? Check Out New Recommendations from CISA and NSA
The SBOM concept is still half-baked, but CISA and NSA want to help change that with new best practices for software vendors, developers and buyers. Plus, there’s new guidance about the Royal ransomware gang – as ransomware attacks grow. In addition, Google highlights a new typosquatting trend…
Tenable Nessus Scanner Capabilities Receive Red Hat Recognition
The Red Hat Vulnerability Scanner Certification for Tenable Nessus represents our commitment to continue providing customers with visibility into their Red Hat Enterprise Linux systems. Read about what this means and how it benefits our customers.
Tenable Cyber Watch: Average Org Fails to Prevent 43% of Attacks, AI Models Lack Transparency, and more
This week’s edition of Tenable Cyber Watch unpacks why organizations fail to prevent more than 40% of cyberattacks and addresses how the White House plans to tackle AI. Also covered: Study shows AI models lack transparency.
Cybersecurity Snapshot: Critical Infrastructure Security in the Spotlight in November
It’s “Critical Infrastructure Security and Resilience Month” – check out new resources from the U.S. government to better protect these essential organizations. Plus, the U.K.’s cyber agency is offering fresh guidance for mitigating the quantum computing threat. In addition, do you need a…
Tenable Cyber Watch: GenAI Drives AI Adoption for Cybersecurity, Ransomware Attacks Double in Q3, and more
This week’s edition of Tenable Cyber Watch unpacks how generative AI is driving AI adoption for cybersecurity and addresses why board directors are becoming more confident in their organization’s cybersecurity. Also covered: Ransomware attacks almost doubled in Q3.
Cybersecurity Snapshot: Why Organizations Struggle to Prevent Attacks and How They Can Do Better
Find out the top people, process and technology challenges hurting cybersecurity teams identified in a commissioned study by Forrester Consulting on behalf of Tenable.
Cyber Watch: Tenable CSO Bob Huber on Common Employee Behaviors That Can Put Your Company At Risk
On this special edition of Tenable Cyber Watch, Tenable CSO Bob Huber discusses whether certain common employee behaviors are security risks for a company - red flags 🔴 or green flags 🟢.
Tenable Cyber Watch: IAM Ranks No. 1 as Most In-Demand Cyber Tech Skill; Anti-Phishing Best Practices, and more
This week's edition of Tenable Cyber Watch unpacks the most sought-after cyber skills and addresses how to protect your organization from phishing attacks. Also covered: The most common method used to log into online accounts.
Cybersecurity Snapshot: GenAI Drives Broader Use of Artificial Intelligence Tech for Cyber
Check out how organizations’ enthusiasm over generative AI is fueling artificial intelligence adoption for cybersecurity. Plus, how CISA plans to revamp the U.S. government’s cyber incident response plan. In addition, learn about a new set of best practices for protecting cloud backups. Also, why…
Tenable Cyber Watch: U.S., Japan Warn Of Chinese ‘BlackTech’ Attackers, CISA Unveils New HBOM Framework, and more
This week’s edition of Tenable Cyber Watch unpacks BlackTech, the hackers linked to the Chinese government who are stealthily compromising network devices. We also cover two CISA initiatives: A new HBOM framework for hardware supply chain risk and an updated reference architecture for identity…
Cybersecurity Snapshot: Cyber Teams Adopt GenAI, Integrated Suites To Boost Defenses
Cyber leaders are embracing generative AI and product suites, while ditching siloed tools. Plus, check out a guide packed with anti-phishing tips, and another one full of IAM security best practices. Also, discover the skills that cybersecurity recruiters value the most. And much more!
CISA and NSA Release Top 10 Cybersecurity Misconfigurations: How Tenable Can Help
The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations.