Identifying and Securing AI Workloads
Learn why AI workloads demand a new approach to cloud security.
What’s New in Tenable Cloud Security: November Updates in Exposure Management
Tenable Cloud Security delivers critical capabilities to unify security across your entire attack surface. Our latest enhancements let you extend your on-prem vulnerability management program to the cloud; gain granular visibility into external access risk; and discover Snowflake sensitive data.
From Brittle to Scalable: AWS Boosts VPC Perimeter Security with New IAM Keys
AWS has released three new IAM condition keys for VPC endpoints to strictly limit access by specific accounts, organizational units, or AWS Organizations. Learn how these keys help you build scalable security perimeters and reduce manual policy maintenance.
Protecting Your Cloud Data: How Tenable Cloud Security Guards Your Most Valuable Assets in the Cloud
Context is key for protecting data in the cloud. Learn how an integrated CNAPP approach moves beyond basic DSPM and takes into account identities, misconfigurations, and AI workloads to pinpoint the greatest risks to your cloud data.
Tenable Cloud Vulnerability Management: la solución para reducir el riesgo de vulnerabilidades en la era de la nube
Tenable lanzó Tenable Cloud Vulnerability Management, una oferta nueva y potente dentro de Tenable One, para ayudar a los líderes de gestión de vulnerabilidades a identificar, priorizar y corregir exposiciones a lo largo de entornos híbridos y multinube.
What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation
We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.
Minimice el radio de ataque de las vulnerabilidades en la nube
Tenable Cloud Security unifica la visibilidad en las etapas de código, compilación y tiempo de ejecución. Correlaciona vulnerabilidades, identidades y errores de configuración para priorizar la explotabilidad y automatizar la contención, lo que ayuda a los equipos a detectar, controlar y corregir riesgos en entornos multinube e híbridos.
Securing the Mission: Why Container Deployment Scanning Is Essential for the DoD
As DoD agencies accelerate cloud-native adoption under DOGE efficiency mandates, securing containerized workloads is essential to mission assurance. Learn why deployment-time scanning and admission controller enforcement are critical to reduce risk, meet compliance, and modernize security
Tenable Recognized as a CTEM Leader in Latio’s 2025 Cloud Security Market Report
Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty.
No permita que su seguridad en la nube sea víctima de la proliferación de permisos
Los equipos de seguridad en la nube a menudo no pueden ver una de las mayores amenazas para los entornos en nube: una red de identidades con privilegios excesivos que crean rutas para los atacantes. Sepa cómo recuperar el control de sus identidades en la nube mediante la automatización de la aplicación del privilegio mínimo a lo largo de todo su entorno.
The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration
Tenable Research discovered three vulnerabilities (now remediated) within Google’s Gemini AI assistant suite, which we dubbed the Gemini Trifecta. These vulnerabilities exposed users to severe privacy risks. They made Gemini vulnerable to: search-injection attacks on its Search Personalization…
Mitigación del riesgo de errores de configuración en la nube: detección y reparación de fallas ocultas de la seguridad en la nube
Seemingly innocuous cloud configuration errors can create massive security risks, especially if your teams are siloed and your security tools don’t play well with each other. Find out how a unified, proactive security approach provides the visibility and automation needed to find and fix these…