Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help.
Tenable Cyber Watch: Top-In Demand Cyber Skills, Key Cloud Security Trends, Cyber Spending, and MoreJanuary 16, 2023
We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity. It's Monday! Time to gra...
Cybersecurity Snapshot: U.S. Gov’t Turns Up Heat on Breach Notifications, While Cyber Concerns Still Hamper Cloud ValueJanuary 13, 2023
Learn all about the FCC’s plan to accelerate telecom breach reports. Plus, why cyber worries remain a cloud obstacle. Also, find out how to rate your cloud MSP’s cybersecurity strength. Then check out our ad-hoc poll on cloud security. And much more!
A new report from Google outlines a set of evolving threats that cloud security teams should keep an eye on in the new year.
Microsoft addresses 98 CVEs including a zero-day vulnerability that was exploited in the wild.
It's that time again! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, the weekly video news digest that helps you zero-in on the things that m...
Cybersecurity Snapshot: Discover the Most Valuable Cyber Skills, Key Cloud Security Trends and Cyber’s Big Business ImpactJanuary 6, 2023
Happy New Year! Learn all about the cybersecurity expertise that employers value most; Google Cybersecurity Action Team’s latest take on cloud security trends; a Deloitte report on cybersecurity’s growing business influence; a growth forecast for cyber spending; and more!
CVE-2022-47523: ManageEngine Password Manager Pro, PAM360 and Access Manager Plus SQL Injection VulnerabilityJanuary 5, 2023
Zoho patches a newly disclosed high-severity SQL injection flaw in several ManageEngine products; attackers have historically targeted several ManageEngine products over the last three years.
External attack surface management (EASM) is difficult and oftentimes confusing, especially in a world of poor inventory controls and a growing attack surface. This blog discusses what's required to do EASM successfully.
Banish the post-holiday blues with news you can use: this week's episode of Tenable Cyber Watch takes a look at four cybersecurity trends to watch for 2023. Learn how extortion tactics will reshape ransomware, OT security, SaaS worries and protecting the cloud are top of mind for our experts.
Cybersecurity Snapshot: Key 2022 Data for Cloud Security, Vulnerability Management, EASM, Web App Security and MoreDecember 30, 2022
As 2022 ends, we highlight important data points that shine a light on the trends, challenges and best practices that matter to cybersecurity leaders eager to boost their exposure management and reduce their organizations’ cyber risk.
A critical remote code execution vulnerability in the Linux kernel has been publicly disclosed by Trend Micro's Zero Day Initiative in its ZDI-22-1690 advisory. The vulnerability has been given a CVSSv3 of 10.0. There are no reports of active exploitation.