Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

December 5, 2025

Instantánea de ciberseguridad: Fending Off BRICKSTORM Malware Data-Theft Attacks and Integrating AI into OT Securely

CISA has identified a China-backed BRICKSTORM malware campaign targeting the IT and government sectors. Meanwhile, global agencies released a guide for adding AI safely to OT. Plus, proving your online content is legit; fighting cyber fraud; and preventing bank account takeover scams.

September 16, 2025

Se acabaron los puntos ciegos: cómo obtener visibilidad completa del SDLC en un entorno multinube

¿Tiene dificultades con un entorno multinube desordenado? Sepa cómo el abordaje unificado de seguridad en la nube de Tenable le ayuda a eliminar puntos ciegos peligrosos, obtener visibilidad y control completos, y proteger sus activos desde la primera línea de código hasta la producción total.


September 16, 2025

IDC Ranks Tenable #1 in WW Device Vulnerability and Exposure Management Market Share

Tenable’s market share leadership in Worldwide Device Vulnerability and Exposure Management is a testament to the trust tens of thousands of customers place in Tenable One every day. Our placement also marks seven consecutive years at #1.


September 15, 2025

How to Apply CISA’s OT Inventory and Taxonomy Guidance for Owners and Operators Using Tenable

A complete and detailed operational technology (OT) asset inventory and taxonomy are not only the foundation of a defensible security posture, they’re also essential for resilient operations. Here’s a breakdown of CISA's latest OT guidance with details on how Tenable can help you turn it into…


September 15, 2025

Exploring the Exposure Management Maturity Model

Todos los lunes, la Exposure Management Academy de Tenable ofrece la orientación práctica y del mundo real que necesita para pasar de la gestión de vulnerabilidades a la gestión de exposición. In the first of a two-part blog series, Tenable’s Pierre Coyne guides you through the Tenable Exposure Management Maturity Model.


September 12, 2025

Instantánea de ciberseguridad: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future

Check out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures!


September 11, 2025

Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale

Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an…


September 10, 2025

Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success

An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize actions and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re…


September 10, 2025

Nuevo informe de Tenable: De qué manera la complejidad y la seguridad deficiente de la IA ponen en riesgo los entornos en la nube

This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…


September 9, 2025

Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)

Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >

× Póngase en contacto con nuestro equipo de ventas