Tenable Blog
SubscribeTenable Capture the Flag 2021: The Results Are In!
Know Thy Assets: The First Step in Securing Your Industrial Environment
As operational technology systems are exposed to new cyber risks, security leaders can maximize their defense of critical industrial environments through comprehensive and detailed inventory of...
Introducing Tenable.ep: The First Risk-Based VM Platform as Dynamic as Your Attack Surface
Conquering your cyber risk requires a new approach to vulnerability management. With Tenable.ep, security teams gain a single, flexible license that enhances visibility and eliminates friction, so...
Learn the Language of Vulnerability Assessment: Key Security Terms You Should Know
Your introduction to vulnerability assessment doesn't have to be confusing – let's go over the key terms. When you're new to vulnerability assessment (VA) – or any other area of cybersecurity, for...
Asset Detection with Nessus Scanners: The First Step In Assessing Cyber Risk
Building a precise inventory of existing assets across your attack surface is essential for effective vulnerability management. Here's how the asset detection process in Nessus scanners can help....
When It Comes to Your Drinking Water, How Safe Is Your Operational Technology?
The recent intrusion of a Florida water-treatment plant highlights the need for strong protection of industrial control systems. Here's what you should consider.
Reducing Blind Spots in Cybersecurity: 3 Ways Machine Learning Can Help
Faced with an expanding attack surface and limited resources, security teams can apply machine learning to prioritize business risks and help predict what attackers will do next.
Protecting Your Cloud Assets: Where Do You Start?
When securing dynamic cloud environments, the ability to continuously discover and assess cloud assets allows you to quickly detect issues as new vulnerabilities are disclosed and as your...
NERC CIP-008-6: How Power Grid Operators Can Improve Their Incident Reporting
The new NERC CIP-008-6 regulation challenges power grid operators to differentiate attempts to compromise their environment from other non-malicious cyber incidents. Here’s how Tenable can help.
Securing Classified Telework: 3 Principles for Protecting Sensitive Data
As pandemic restrictions linger, federal agencies are preparing for a rise in classified telework. Here’s why a continued focus on cybersecurity fundamentals is imperative. The COVID-19 pandemic...
Cloud Security: Improve Cyber Hygiene with Resource Tagging
Adopting consistent tagging practices can help to quickly identity resources, ensure change control efforts, and reduce security risks within your cloud environments. Many organizations use the cloud...
OT Incident Response: 4 Reasons Asset Inventory Is Key
Without a detailed view of the assets and vulnerabilities across your OT environment, security leaders face increased costs and delays when it comes to incident response efforts.
Ready to Test Your Hacking Skills? Join Tenable’s First CTF Competition!
Tenable launches new Capture the Flag event for the security community, running from February 18–22. Capture the Flag events are a tried and true way of testing your cybersecurity skills, practicing...