Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

March 16, 2026

Don't confuse asset inventory with exposure management

Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can't connect vulnerabilities, identities, misconfigurations, and AI systems into real attack paths, you don't have exposure management. You have inventory.

July 19, 2006

Detecting Network Change

Tenable has recently added several TASL correlation rules which detect a variety of network changes. These rules automatically detect: Changes to servers such as new software and added patches Changes to users such as adding/removing a user, changing their passwords and disabling their…


By  Ron Gula
July 19, 2006

CentOS Patch Auditing

Tenable is now tracking patch updates to the CentOS Linux operating system. The Nessus Direct and Registered feeds are now updated with host-based patch audits for CentOS. There are more than 200 audits currently available at the time of this post writing. 


By  Ron Gula
July 19, 2006

Detecting when Credentials Fail

If you are using Nessus to perform credentialed audits of UNIX or Windows systems, analyzing the results to determine if you had the correct passwords and SSH keys can be difficult. Nessus users can now easily detect if their credentials are not working. Tenable has added Nessus plugin #21745. This…


By  Ron Gula

您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。