Tenable 博客
網路安全快照: Fending Off BRICKSTORM Malware Data-Theft Attacks and Integrating AI into OT Securely
How Rapid AI Adoption Is Creating an Exposure Gap
As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it.
Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215)
Microsoft addresses 63 CVEs including one zero-day vulnerability which was exploited in the wild.
Tenable 在首次发行的 Gartner® Magic Quadrant™ for Exposure Assessment Platforms 中荣获领导者称号
我们的客户正在证明暴露风险管理所带来的真正价值。感谢您对我们的信赖,助您完成使命。
網路安全快照: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework
Learn why Google expects AI to transform cyber defense and offense next year, and explore MITRE's major update to the ATT&CK knowledge base. We also cover a new McKinsey playbook for agentic AI security, along with the latest on Microsoft Exchange protection and the CIS Benchmarks.
What's New in Tenable Cloud Security: Enhanced Visibility, Prioritization, and Navigation
We have enhanced our Tenable Cloud Security CNAPP product to give you greater visibility, smarter prioritization, and a more streamlined user experience.
Why Security and IT Disagree on Patching (and Why That's a Good Thing)
Let's be frank, for most organizations, patching is a mess. It's the flashpoint where two of the most critical departments in the company, security and IT, seem to be working against each other.
7 Questions EDR Providers Hope You Won’t Ask About Their “Exposure Management” Solution
Not all exposure management platforms are created equal. But how can you pick the right one for your organization? Here’s a set of questions designed to help you cut through vendor noise and make an informed decision.
HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.
Strengthening Industrial Network Security: How to Achieve NERC CIP-015 Compliance with Tenable OT Security
Discover how the latest NERC CIP standard for Internal Network Security Monitoring (INSM) shifts the focus inside your network, and how Tenable can help deliver the comprehensive visibility required to achieve compliance and enhance security.