Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

July 29, 2025

Identity is the New Perimeter: Why Your IdP Isn’t Enough

In a cloud-first world, identity is one of the most critical layers of security. While organizations are making progress using IdPs, major identity protection gaps remain....


July 28, 2025

Tenable Is Named a Gartner Peer Insights Customers’ Choice for the Vulnerability Assessment Market

Tenable customers have spoken: Here’s what they’re saying about our products....


July 28, 2025

The Keys to Implementing Exposure Management

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on hesitations around exposure management. ...


作者:Tenable 團隊
July 25, 2025

網路安全概要: SharePoint Attacks Trigger Urgent Patching Calls, While U.S. Gov’t Unveils AI Innovation Plan

Check out the latest on attackers’ cyber siege of SharePoint servers. Plus, the White House releases plan to spur AI innovation. In addition, CISA alerts orgs about Interlock ransomware. And get the latest on Q2's top malware; ransomware trends; and credentialed scanning....


July 24, 2025

縮小焦點: Tenable VPR 之增強功能及其與其他優先排序模型的比較

Tenable 為弱點優先順序評分 (VPR) 推出多項增強功能,包含更豐富的威脅情報、AI 驅動的洞察與可解釋性,以及背景資訊中繼資料。 Learn how the improved prioritization effectiveness of the enhanced VPR compares to other common prioritiz...


July 23, 2025

Tackling Shadow AI in Cloud Workloads

As enterprise adoption of cloud AI systems balloons, protecting them has become a priority for cybersecurity teams. Shadow AI – the rampant, unsanctioned use of AI apps and services – has emerged as a particularly critical threat. Here we outline two best practices that can help you combat shadow AI...


July 21, 2025

Forrester 在 2025 年第 3 季 Unified Vulnerability Management Solutions Wave™ 報告中將 Tenable 評為領導者

“Tenable continues to extend its established vulnerability management offerings into exposure management with its Tenable One platform,” according to the report....


July 21, 2025

How Exposure Management Can Turn a Torrent of Data into Insight

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we look at the results of a survey taken during a recent Tenable webinar on the greatest cybersecurity challenges....


作者:Tenable 團隊
July 20, 2025

CVE-2025-53770: Frequently Asked Questions About Zero-Day SharePoint Vulnerability Exploitation

Successful exploitation of CVE-2025-53770 could expose MachineKey configuration details from a vulnerable SharePoint Server, ultimately enabling unauthenticated remote code execution....


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

一窺勒索軟體生態系統究竟

下載報告 >