Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

July 23, 2025

Tackling Shadow AI in Cloud Workloads

As enterprise adoption of cloud AI systems balloons, protecting them has become a priority for cybersecurity teams. Shadow AI – the rampant, unsanctioned use of AI apps and services – has emerged as a particularly critical threat. Here we outline two best practices that can help you combat shadow AI in your cloud workloads.

Mayo de 30, 2011

SecurityCenter 4.2 and Community Dashboard Site Released

<p><a href="http://blog.tenable.com/.a/6a00d8345495f669e201538ed394cc970b-pi" style="display: inline;"><img alt="FWR_SC" border="0" class="asset asset-image at-xid-6a00d8345495f669e201538ed394cc970b" src="http://blog.tenable.com/.a/6a00d8345495f669e201538ed394cc970b-800wi" title="FWR_SC" /></a>&#01...


By  Ron Gula
7, 2011 de febrero

Tenable All-Star Showcase - Atlanta - February 22

&nbsp;Tenable Network Security will be hosting a half-day security and compliance seminar in Atlanta featuring Marcus Ranum, Ron Gula and Renaud Deraison. This is your chance to interact with Tenable executives, get the latest news and perspectives on industry trends, ask questions about Nessus and ...


By  Ron Gula
Enero de 13, 2011

Putting a Virus under the SIEM Microscope Webinar

&nbsp;&nbsp;When a virus infected one of my Nessus scan targets, I did what any sensible CEO&nbsp;of a SIEM company would do - let it run and see what types of logs and alerts it generated!Over the 30 days that I let it run, I was able to collect a wide variety of interesting data. This included sus...


By  Ron Gula
Enero de 5, 2011

Tenable Network Security Podcast - Episode 64

<p>Welcome to the Tenable Network Security Podcast - Episode 64</p> <p>Hosts: Paul Asadoorian, Product Evangelist, and Ron Gula, CEO/CTO</p> <h3>Announcements</h3> <ul> <li>Several new blog posts have been published this week, including: <ul><li><a href="http://blog.tenablesecurity.com/2011/01/...


Enero de 5, 2011

Log Correlation Engine 3.6 – Now with its own GUI

<p>Tenable Network Security has released version 3.6 of the <a href="http://www.nessus.org/products/lce/" target="_self">Log Correlation Engine</a>. This new version includes many performance enhancements as well as its own web-based user interface. This blog entry describes the new user interface, ...


By  Ron Gula
Diciembre de 28, 2010

SSL Certificate Authority Auditing with Nessus

<p>Do you know where all of your organization’s SSL certificates are and if they are providing enough protection to you and your customers? Nessus can be used to identify all SSL certificates in use, test if they are expired and with the advent of plugin # <a href="http://www.tenable.com/plugins/ind...


By  Ron Gula
Diciembre de 7, 2010

Introducing the Nessus Perimeter Service : redefining the cost of online scanning

&nbsp;Have you ever wanted to run an external Nessus vulnerability audit of your DMZ but didn’t have access to a Nessus scanner located on the outside of your network? Tenable Network Security now offers the Nessus Perimeter Service, offering unrestricted and unlimited vulnerability scans through an...


By  Ron Gula
Julio de 12, 2010

Tenable at Black Hat USA 2010!

<p>July hasn’t been hot enough for me and some of the other Tenable staffers, so we will be heading to the desert of Las Vegas in a few weeks to attend <a href="https://www.blackhat.com/html/bh-us-10/bh-us-10-home.html" target="_blank">Black Hat USA 2010</a>! Since 1997, the Black Hat conference has...


Julio de 6, 2010

Tenable Network Security Podcast - Episode 41

<p>Welcome to the Tenable Network Security Podcast - Episode 41</p> <p>Hosts: Paul Asadoorian, Product Evangelist &amp; Kelly Todd, Compliance Analyst</p> <h3>Announcements</h3> <ul> <li>Several new blog posts have been published this week, including: <ul> <li><a href="http://blog.tenablesecur...


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >