Remove products tenable-one evaluate
article thumbnail

Strengthening the Nessus Software Supply Chain with SLSA

Tenable

You know Tenable as a cybersecurity industry leader whose world-class exposure management products are trusted by our approximately 43,000 customers, including about 60% of the Fortune 500. At Tenable, protecting our software supply chain is a top priority. Let’s look more closely at each one of these elements.

article thumbnail

Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development

Tenable

In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of Microsoft customers. Microsoft Azure Linux is a newly launched container host that provides reliability and consistency from cloud to edge across the Azure Kubernetes Service (AKS), AKS-HCI, and Azure Arc products.

Linux 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

Tenable

Phobos ransomware hitting critical infrastructure, emergency services And we’re returning to the topic of how ransomware gangs have their sights set on critical infrastructure targets. The chart below shows the percentage of cybersecurity pros that support more than one functional area. What’s new? For starters, version 2.0

article thumbnail

Mind the Gap: How Existing Vulnerability Frameworks Can Leave an Organization Exposed

Tenable

This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and discuss how Tenable can help.

article thumbnail

CVE-2022-37958: FAQ for Critical Microsoft SPNEGO NEGOEX Vulnerability

Tenable

Valentina Palmiotti, a security researcher on IBM Security’s X-Force Red team discovered that CVE-2022-37958 could lead to RCE. Microsoft re-evaluated the vulnerability and changed its classification from Information Disclosure to RCE, its severity to Critical and assigned a CVSSv3 score of 8.1 Why did its classification change?

Windows 98
article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

AI developers offer little transparency into their work, especially in areas like training data and methods, which makes it difficult to evaluate the safety of their systems. CIS Benchmarks are secure-configuration guidelines for hardening products against cyberattacks. Incidents of malicious AI use are rising quickly. CIS MariaDB 10.6

article thumbnail

Are You Ready for the Next Log4Shell? Tenable’s CSO and CIO Offer Their Advice

Tenable

Tenable CIO Patricia Grant and CSO Robert Huber share insights and best practices to help IT and cybersecurity leaders and their teams weather the next cyber crisis of Log4j proportions. Now, the one-year anniversary of the earth-shaking Log4j event offers an opportunity to take stock and ponder key questions, such as: “What did we learn?”