Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

September 9, 2025

Microsoft’s September 2025 Patch Tuesday Addresses 80 CVEs (CVE-2025-55234)

Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.

September 9, 2025

Breaking Down Silos: Why You Need an Ecosystem View of Cloud Risk

A disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform – giving you the context to pinpoint your…


September 8, 2025

Secrets at Risk: How Misconfigurations and Mistakes Expose Critical Credentials

Despite all the innovation in cloud computing, one persistent issue lurks in the shadows to undermine security hygiene - poor secrets management. Here, we explain compromised secrets’ impacts and causes and offer concrete risk-mitigation recommendations.


September 8, 2025

ICYMI:Exposure Management Academy on Attack Surface Management, Proactive Security and More

每週一,Tenable 曝險管理學院都會分享實用且貼近真實世界的指引,協助您從弱點管理成功轉向曝險管理。 In this post, we look back on the guidance and best practices shared in the past several months.


作者:Tenable 團隊
September 5, 2025

網路安全概要: Expert Advice for Securing Critical Infrastructure’s OT and Industrial Control Systems, IoT Devices and Network Infrastructure

Destructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical infrastructure networks. With this type of cyber threat in the…


September 4, 2025

Identity-First Security: Mitigating the Cloud’s Greatest Risk Vector

Compromised credentials are now the leading cause of cloud breaches, making identity your most critical attack surface. A new IDC white paper explores why this shift is happening and where traditional defenses fall short. Read on to learn how Tenable's identity-first approach turns this risk into…


September 3, 2025

Tenable Response to Salesforce and Salesloft Drift Incident

At Tenable, we take transparency seriously, especially when it comes to protecting our customers’ data. We recently learned of a widespread data theft campaign involving the integration of Salesforce and Salesloft Drift, and Tenable was among the many organizations impacted. In line with our…


September 3, 2025

Synack + Tenable: AI-Powered Partnership Translates Vulnerability Insights into Action

The combined Synack/Tenable solution reduces alert noise for overloaded security teams, isolating the most exploitable threats so they can proactively close security gaps faster.


September 2, 2025

Building a Cloud Security Strategy with AWS Native Tools

Are you an Amazon Web Services customer looking to build a cloud security strategy? If so, you’ve got an array of choices. Learn about their strengths and gaps — and why you need to augment them with a CNAPP like Tenable Cloud Security.


August 29, 2025

Frequently Asked Questions About Chinese State-Sponsored Actors Compromising Global Networks

An analysis of Tenable telemetry data shows that the vulnerabilities being exploited by Chinese state-sponsored actors remain unremediated on a considerable number of devices, posing major risk to the organizations that have yet to successfully address these flaws.


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

一窺勒索軟體生態系統究竟

下載報告 >