Tenable blog
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

IDSA Introduces CIEM Best Practices
The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management....
Microsoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)
Microsoft addresses 62 CVEs in its September 2022 Patch Tuesday release, including five critical flaws....
針對效能與資源使用量調校網路評估
Using the correct tool for the job and optimizing scanner placement will have a large impact on scan efficiency with Nessus, Tenable.io and Tenable.sc....
網路安全快照: 現在最重要的 6 件事
Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security tools. Increasing diversity in cybersecurity. Another look at the major cloud security threats. And much more!...
IT/OT Convergence: Now Is the Time to Act
Presidential advisory committee provides recommendations to improve critical infrastructure security....
96% Could Have Prevented Their Identity Breach – IDSA
Identity-related breaches are on the rise but security and IAM pros are not idle. Learn from this survey how they are staving off the next attack....
掌握企業風險脈絡是實現全面 IT 能見度的必備要素
全面並持續掌握所有 IT 資產最新且詳盡的動態,是安全團隊夢寐以求的目標。 To achieve it, we must first understand what “visibility” truly entails, how it’s more than just identifying what’s out there and knowing which challenges must be addressed....
網路安全快照: 現在最重要的 6 件事
Topics that are top of mind for the week ending Sept. 2 | Shift-left efforts falling short. What CISOs earn and what stresses them out. The quantum computing risk for critical infrastructure. Securing machine learning systems. And much more!...
Taking Notice of AWS IAM Roles Anywhere
IAM Roles Anywhere may be a pivotal moment for security — the new service lets you enrich the arsenal of tools at your disposal to improve your AWS security posture....