How Industry Partnerships Support Taking a Proactive, Preventive Approach to Cybersecurity
February 16, 2023Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can benefit customers.
Tenable One Exposure Management Platform: Unlocking the Power of Data
November 3, 2022When our data engineering team was enlisted to work on Tenable One, we knew we needed a strong partner. Here’s how we selected Snowflake to help us deliver on the promise of exposure management.
Python NaN Injection
December 29, 2021In Python, a NaN can cause a slew of errors leading to numerous failure conditions. Test for NaNs using a white-box scenario to avoid fallout.
An Introduction to “Scan Everything”
September 21, 2021A “scan everything” approach tests and triages every asset to understand your organization’s risk and how to reduce risk quickly and efficiently.
10 Reasons Why Websites STILL Get Hacked
June 21, 2021Even with all of the cybersecurity solutions on the market today, websites are still getting hacked by attackers. Find out how your organization could be exposed to hackers
Do Not Take an IP-centric Approach to Attack Surface Mapping
May 5, 2021Relying on IP data to identify assets means you're likely missing critical information needed to map your attack surface.
High-Fidelity Attack Surface Mapping
April 12, 2021Eliminate blind spots and hinder attackers using these three tips to create a high-fidelity map of your organization’s entire attack surface.
NetFlow is the Wrong Way to Do Attack Surface Mapping
March 26, 2021If your organization relies on NetFlow data for asset management, you're likely overlooking vital information to map your attack surface.
Static Lists Are The Wrong Way to Do Attack Surface Mapping
March 8, 2021When identifying and cataloging assets, static lists leave your organization vulnerable to constant changes across your attack surface.
Daisy Chaining: How Vulnerabilities Can Be Greater Than the Sum of Their Parts
January 21, 2021With the rise of daisy-chained cyberattacks, security teams must consider the contextual risk of each vulnerability, including its potential to be leveraged in a full system compromise.
How Tenable Engineering Stays Connected in the COVID-19 Era
October 2, 2020Supporting remote engineering teams requires intentional efforts to spur social engagement and make it easier for employees to unplug from work. Here are some tactics your team can use to drive health...
Conversational Kotlin: A Look at the Benefits of Readable Code
July 30, 2020In the latest blog from [email protected], we explore how the goal of readable code can help engineering teams minimize errors and expedite software updates. It’s probably a safe assumption that mo...