Beating the Mythos clock: Using Tenable Hexa AI custom agents for automated patching
See how Tenable Hexa AI custom agents empower you to counter machine-speed threats by automating vulnerability remediation. Learn how the Model Context Protocol (MCP) automates execution of risk-driven patching workflows, shifting your strategy from reactive tracking to continuous exposure…
Desbloqueo de la visibilidad fundamental de los sistemas ciberfísicos con OT Vulnerability Management
Deje de gestionar el riesgo en silos aislados. VM-Native OT Discovery, ahora disponible en Tenable Vulnerability Management y Tenable Security Center, proporciona visibilidad unificada en todos los dominios de TI y OT. Vea todos los activos y gestione su exposición cibernética total en una vista unificada.
Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI
See how you can use Tenable Hexa AI to determine in minutes if you're impacted by the Axios npm supply chain attack. Learn how easy it is to automate configuration of scans, identify impacted assets, prioritize remediation, and more using agentic AI from Tenable.
Uncover prompt injection, insider threats with the Tenable One Model Refusal Detection
Tenable One's new Model Refusal Detection turns an LLM's refusal to execute a risky or suspicious prompt into a high-fidelity early warning signal. It helps you uncover and stop prompt injection attacks, insider threats, and other risky behaviors before they escalate into a breach.
Conozca a Tenable Hexa AI: IA agéntica para la gestión de exposición
Conozca a Tenable Hexa AI: el motor agéntico de la plataforma de gestión de exposición Tenable One. Sepa cómo Tenable Hexa AI automatiza flujos de trabajo de seguridad complejos y transforma la inteligencia de exposición en acciones coordinadas, para ayudar a su equipo de seguridad a reducir significativamente el riesgo cibernético.
Bolster your defenses and close the code-to-cloud gap with Tenable and OX
Today, cloud security teams face fragmented visibility and the challenge of prioritizing risks while identifying fix owners. A new joint solution from Tenable and OX helps you close the code-to-cloud gap from development through runtime. By combining CNAPP with deep AppSec, this integration is…
How to prepare for NERC CIP compliance deadlines in 2026 and beyond
Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (Bulk Electric System) Cyber Systems, and how Tenable can help deliver the comprehensive visibility required to ensure compliance.
Tenable fue nombrada como Challenger en el informe 2026 Gartner® Magic Quadrant™ for CPS Protection Platforms
Security is no longer a siloed effort. Find out how Tenable integrates mature industrial security capabilities into an enterprise-ready approach for unified exposure management.
Strengthening California’s Cyber Defenses: Apply Now for FFY 2024 SLCGP Grants
Cal OES offers up to $250,000 to help California’s state, local, and tribal agencies strengthen their digital infrastructure against evolving cyber threats. Organizations must submit their applications by March 13, 2026.
2025 SLG cyber trends: 5 lessons to build a 2026 cyber roadmap
From school districts to state agencies, 2025 cyber incidents were a wake-up call about asset visibility. Discover five actionable lessons SLG leaders can use to close the cyber exposure gap and move from reactive threat detection and response to proactive exposure management.
What’s New in Tenable Cloud Security: Multi-cloud Risk Analysis, Attack Surface Assessments, Improved IAM Security and More
Tenable Cloud Security continues to expand the technical depth of our Tenable One exposure management platform. Our latest enhancements include unified multi-cloud exploration, high-fidelity network validation, and expanded entitlement visibility across infrastructure and identity providers.
Presentamos Tenable One AI Exposure: un nuevo método para proteger el uso de la IA a gran escala
Con Tenable One AI Exposure, detecte y monitoree de forma constante todo el uso de la IA a lo largo de su organización, incluyendo la IA oculta, los agentes, los plug-ins del navegador y mucho más. Correlacione flujos de trabajo complejos de IA para revelar las exposiciones de alto impacto y monitorear el cumplimiento de las políticas de seguridad y uso aceptable de la IA.