How Industry Partnerships Support Taking a Proactive, Preventive Approach to CybersecurityFebruary 16, 2023
Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can benefit customers.
Tenable One Exposure Management Platform: Unlocking the Power of DataNovember 3, 2022
When our data engineering team was enlisted to work on Tenable One, we knew we needed a strong partner. Here’s how we selected Snowflake to help us deliver on the promise of exposure management.
Python NaN InjectionDecember 29, 2021
In Python, a NaN can cause a slew of errors leading to numerous failure conditions. Test for NaNs using a white-box scenario to avoid fallout.
An Introduction to “Scan Everything”September 21, 2021
A “scan everything” approach tests and triages every asset to understand your organization’s risk and how to reduce risk quickly and efficiently.
10 Reasons Why Websites STILL Get HackedJune 21, 2021
Even with all of the cybersecurity solutions on the market today, websites are still getting hacked by attackers. Find out how your organization could be exposed to hackers
Do Not Take an IP-centric Approach to Attack Surface MappingMay 5, 2021
Relying on IP data to identify assets means you're likely missing critical information needed to map your attack surface.
High-Fidelity Attack Surface MappingApril 12, 2021
Eliminate blind spots and hinder attackers using these three tips to create a high-fidelity map of your organization’s entire attack surface.
NetFlow is the Wrong Way to Do Attack Surface MappingMarch 26, 2021
If your organization relies on NetFlow data for asset management, you're likely overlooking vital information to map your attack surface.
Static Lists Are The Wrong Way to Do Attack Surface MappingMarch 8, 2021
When identifying and cataloging assets, static lists leave your organization vulnerable to constant changes across your attack surface.
Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their PartsJanuary 21, 2021
With the rise of daisy-chained cyberattacks, security teams must consider the contextual risk of each vulnerability, including its potential to be leveraged in a full system compromise.
How Tenable Engineering Stays Connected in the COVID-19 EraOctober 2, 2020
Supporting remote engineering teams requires intentional efforts to spur social engagement and make it easier for employees to unplug from work. Here are some tactics your team can use to drive health...
Conversational Kotlin: A Look at the Benefits of Readable CodeJuly 30, 2020
In the latest blog from [email protected], we explore how the goal of readable code can help engineering teams minimize errors and expedite software updates. It’s probably a safe assumption that mo...