How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk
Wondering what your peers think of exposure management? New reports from the Exposure Management Leadership Council, a CISO working group sponsored by Tenable, offer insights.
IDC 报告“Worldwide Device Vulnerability and Exposure Management Market Shares“将 Tenable 评为第一名
Tenable 在全球设备漏洞与暴露风险管理领域的市场份额居领先地位,这正是数以万计的客户每天对 Tenable One 充满信任的有力证明。此外,我们的排名连续 7 年位居第一。
網路安全快照: Security Lags Cloud and AI Adoption, Tenable Report Finds, as CISA Lays Out Vision for CVE Program's Future
Check out Tenable’s report detailing challenges and best practices for cloud and AI security. Plus, CISA rolled out a roadmap for the CVE Program, while NIST updated its guidelines for secure software patches. And get the latest on TLS/SSL security and AI attack disclosures!
Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale
Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an…
Tenable 新报告:复杂性与薄弱的 AI 安全如何使云环境面临风险
This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…
網路安全快照: Agentic AI Security in Focus With Anthropic’s Chilling Abuse Disclosure and CSA’s New Identity Protection Framework
Check out Anthropic’s unvarnished description of how a brazen attacker maliciously used its Claude Code product. Plus, the CSA tackles IAM in agentic AI systems. In addition, cyber agencies issue a stark warning about cyber espionage threat from China-backed APT groups. And get the latest on SBOMs,…
Why Google’s Warning Highlights Critical Risk of AI Context-Injection Attacks
Google, with its unparalleled visibility into Gemini, recently alerted its legion of Gmail users about indirect prompt attacks, which exploit AI context sources like emails, calendar invites and files. Coming from a major AI vendor, the frank and direct public alert leaves no doubt that…
網路安全快照: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices
CISA stresses that an asset inventory is the foundation for OT security. Meanwhile, NIST has finalized cryptographic algorithms for resource-constrained devices. The agency is also developing control overlays for AI systems. Plus, a report reveals that security budget growth has slowed to a five…
The AI Security Dilemma: Navigating the High-Stakes World of Cloud AI
AI presents an incredible opportunity for organizations even as it expands the attack surface in new and complex ways. For security leaders, the goal isn't to stop AI adoption but to enable it securely.
網路安全快照: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security
Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation;…
網路安全快照: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan
Check out the latest on attackers’ cyber siege of SharePoint servers. Plus, the White House releases plan to spur AI innovation. In addition, CISA alerts orgs about Interlock ransomware. And get the latest on Q2's top malware; ransomware trends; and credentialed scanning.
Tackling Shadow AI in Cloud Workloads
As enterprise adoption of cloud AI systems balloons, protecting them has become a priority. Shadow AI – the unsanctioned use of AI apps – has emerged as a particularly critical threat. Here we outline two best practices that can help you combat shadow AI in your cloud workloads.