Blog de Tenable
7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.
Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security
Discover how the latest NERC CIP standard for Internal Network Security Monitoring (INSM) shifts the focus inside your network, and how Tenable can help deliver the comprehensive visibility required to achieve compliance and enhance security.
Instantánea de ciberseguridad: Top Guidance for Improving AI Risk Management, Governance and Readiness
Many organizations are playing catch-up in key AI security policy areas, such as usage governance, risk oversight, data protection, and staff training. In this Cybersecurity Snapshot special edition, we round up recent guidance on preparing for, managing and governing AI cyber risks.
Minimize the Vulnerability Blast Radius in the Cloud
Tenable Cloud Security unifies visibility across code, build, and runtime stages. It correlates vulnerabilities, identities, and misconfigurations to prioritize exploitability and automate containment — helping teams detect, control, and remediate risks across multi-cloud and hybrid environments.
Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD
As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce risk, meet compliance, and modernize security
Security for AI: A Practical Guide to Enforcing Your AI Acceptable Use Policy
An AI acceptable use policy can help your organization mitigate the risk of employees accidentally exposing sensitive data to public AI tools. Benchmark your organization’s policy against our best practices and discover how prompt-level visibility from Tenable AI Exposure eases policy enforcement.
How to Take Vulnerability Management to the Next Level and Supercharge Your Career
At Tenable, we believe the next generation of great CISOs and security leaders will arise from those vulnerability management professionals who are driving the shift to exposure management today.
Instantánea de ciberseguridad: Top Advice for Detecting and Preventing AI Attacks, and for Securing AI Systems
As organizations eagerly adopt AI, cybersecurity teams are racing to protect these new systems. In this special edition of the Cybersecurity Snapshot, we round up some of the best recent guidance on how to fend off AI attacks, and on how to safeguard your AI systems.
Why Early Visibility Matters: Risk Lurks in the Vulnerability Disclosure Gaps
It seems pretty obvious: If an attacker can exploit a vulnerability before you can patch it, your organization is at risk. Yet the gaps between different phases of the vulnerability disclosure process continue to leave security teams in the dark.