Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

April 3, 2026

The developer credential economy: Why exposure data is the new front line in the supply chain war

Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to a preemptive exposure management strategy. Learn why endpoint detection and r...

November 20, 2025

Stop Patching Panic: Ditch Slow Manual Patching and Embrace Intelligent Automation

Fear of a bad patch causing downtime is justified, but manual patching leaves your organization exposed. See how Tenable Patch Management provides autonomy with customizable rules and guardrails, allowing you to rapidly remediate critical vulnerabilities without risking business disruption.


November 19, 2025

Active Directory Trust Misclassification: Why Old Trusts Look Like Insecure External Trusts

Tenable Research reveals an Active Directory anomaly: intra-forest trusts created under Windows 2000 lack a key identifying flag, even after domain and forest upgrades. Learn how to find this legacy behavior persisting to this day, and use crossRef objects to correctly distinguish these trust types.


November 18, 2025

Tenable Cloud Vulnerability Management: la solución para reducir el riesgo de vulnerabilidades en la era de la nube

Tenable lanzó Tenable Cloud Vulnerability Management, una oferta nueva y potente dentro de Tenable One, para ayudar a los líderes de gestión de vulnerabilidades a identificar, priorizar y corregir exposiciones a lo largo de entornos híbridos y multinube. 


November 14, 2025

CVE-2025-64446: Fortinet FortiWeb Zero-Day Path Traversal Vulnerability Exploited in the Wild

Fortinet has released an advisory for a recently disclosed zero-day path traversal vulnerability which has been exploited in the wild. Se insta a las organizaciones a aplicar parches de inmediato.


November 14, 2025

Instantánea de ciberseguridad: Refresh Your Akira Defenses Now, CISA Says, as OWASP Revamps Its App Sec Top 10 Risks

Learn why you should revise your Akira ransomware safeguards and see what’s new in OWASP’s revamped Top 10 Web Application Risks. We also cover agentic AI’s cognitive degradation risk, hackers' abuse of Anthropic's agentic AI, the latest AI security trends, and new data on CISO compensation.


November 13, 2025

How Rapid AI Adoption Is Creating an Exposure Gap

As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it.


November 11, 2025

Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215)

Microsoft addresses 63 CVEs including one zero-day vulnerability which was exploited in the wild.


November 10, 2025

Tenable nombrada como líder en el primer informe Gartner® Magic Quadrant™ for Exposure Assessment Platforms

Nuestros clientes están demostrando lo que puede hacer la gestión de exposición. ¡Muchas gracias por confiar en nosotros para formar parte de su misión!


November 7, 2025

Instantánea de ciberseguridad: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework

Learn why Google expects AI to transform cyber defense and offense next year, and explore MITRE's major update to the ATT&CK knowledge base. We also cover a new McKinsey playbook for agentic AI security, along with the latest on Microsoft Exchange protection and the CIS Benchmarks.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.