Don’t Let Your Cloud Security Catch a Bad Case of Permission Creep
Cloud security teams are often blind to one of the biggest threats to cloud environments: a web of over-privileged identities that create pathways for attackers. Learn how to regain control of your cloud identities by automating the enforcement of least privilege across your environment.
The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration
Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to: search-injection attacks on its Search Personalization…
Defusing Cloud Misconfiguration Risk: Finding and Fixing Hidden Cloud Security Flaws
Seemingly innocuous cloud configuration errors can create massive security risks, especially if your teams are siloed and your security tools don’t play well with each other. Find out how a unified, proactive security approach provides the visibility and automation needed to find and fix these…
What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience
Check out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows and gain deeper visibility across workloads,…
Se acabaron los puntos ciegos: cómo obtener visibilidad completa del SDLC en un entorno multinube
¿Tiene dificultades con un entorno multinube desordenado? Sepa cómo el abordaje unificado de seguridad en la nube de Tenable le ayuda a eliminar puntos ciegos peligrosos, obtener visibilidad y control completos, y proteger sus activos desde la primera línea de código hasta la producción total.
Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale
Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an…
Nuevo informe de Tenable: De qué manera la complejidad y la seguridad deficiente de la IA ponen en riesgo los entornos en la nube
This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…
Análisis de silos: ¿por qué necesita una visión del ecosistema del riesgo en la nube?
A disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform – giving you the context to pinpoint your…
Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials
Despite all the innovation in cloud computing, one persistent issue lurks in the shadows to undermine security hygiene - poor secrets management. Here, we explain compromised secrets’ impacts and causes and offer concrete risk-mitigation recommendations.
Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector
Compromised credentials are now the leading cause of cloud breaches, making identity your most critical attack surface. A new IDC white paper explores why this shift is happening and where traditional defenses fall short. Read on to learn how Tenable's identity-first approach turns this risk into…
Building a Cloud Security Strategy with AWS Native Tools
Are you an Amazon Web Services customer looking to build a cloud security strategy? If so, you’ve got an array of choices. Learn about their strengths and gaps — and why you need to augment them with a CNAPP like Tenable Cloud Security.
Your Map for the Cloud Security Maze: An Integrated Cloud Security Solution That’s Part of an Exposure Management Approach
Check out highlights from the IDC white paper “Bridging Cloud Security and Exposure Management for Unified Risk Reduction,” which explains how CNAPPs help security teams tame the complexity of multi-cloud environments by shifting from a reactive, alert-driven model to a proactive exposure…