Tenable ブログ
サイバーセキュリティニュース: Industrial Systems in Crosshairs of Russian Hackers, FBI Warns, as MITRE Updates List of Top Hardware Weaknesses

Tenable でサイロ化されたセキュリティ対策からエクスポージャー管理に移行
毎週月曜日、Tenable のサイバーエクスポージャー管理アカデミーでは、脆弱性管理からサイバーエクスポージャー管理への移行に必要な、実用的で現実的なガイダンスを提供しています。 In the first of a two-part blog series, Tenable CSO Robert Huber shares how he and his...
サイバーセキュリティニュース: CISA が OT セキュリティが資産インベントリの鍵だと主張、NIST が IoT デバイスを保護するための軽量アルゴリズムを発表
CISA stresses that an asset inventory is the foundation for OT security. Meanwhile, NIST has finalized cryptographic algorithms for resource-constrained devices. The agency is also developing control overlays for AI systems. Plus, a report reveals that security budget growth has slowed to a five-yea...
Tenable One がカナダの組織によるエクスポージャー管理プログラムの導入とコンプライアンス要件の遵守を支援
The Tenable One Exposure Management Platform provides a single source of truth for cyber risk, helping Canadian security teams shift from reactive patching to proactive risk reduction. With native support for Canadian data residency and alignment with frameworks like ITSG-33, Tenable One helps Canad...
CVE-2025-25256: Fortinet FortiSIEM の緊急なコマンドインジェクション脆弱性に対する概念実証が公開される
Exploit code is reportedly available for a critical command injection vulnerability affecting Fortinet FortiSIEM devices.BackgroundOn August 12, Fortinet published a security advisory (FG-IR-25-152) for CVE-2025-25256, a critical command injection vulnerability affecting Fortinet FortiSIEM.CVEDescri...
業務を中断せずに重要な OT/IoT システムのセキュリティリスクを修正
Find out how adopting a proactive approach to secure your operational environments can help you reduce risk and eliminate downtime....
マイクロソフトの 2025 年 8 月月例更新プログラム、107 件の脆弱性を修正 (CVE-2025-53779)
Microsoft addresses 107 CVEs, including one zero-day vulnerability that was publicly disclosed....
脆弱性から可視性へ: SharePoint に対する攻撃により明らかにされた積極的なサイバーセキュリティ対策の必要性
The recent exploitation of Microsoft SharePoint vulnerabilities highlights a critical gap in traditional, reactive cybersecurity strategies. Learn how a proactive exposure management approach empowers federal agencies to reduce risk, streamline operations and stay secure....
予期せぬ侵害: 見えないリスクの組み合わせが組織を危険にさらしている
Most breaches don’t happen because of one glaring issue. They happen when multiple, seemingly low-risk factors silently combine. Learn how invisible risk combinations evade siloed security tools and how an exposure management program gives defenders the context they need to stop attacks before they ...
Tenable が GPT-5 を「脱獄」し、OpenAI の新しいセキュリティ技術にもかかわらず危険な情報を生成
Within just 24 hours of the release of OpenAI’s GPT-5, Tenable Research successfully managed to jailbreak the model by getting it to share detailed instructions for how to build an explosive. Our finding is concerning, given that OpenAI described GPT-5's prompt safety technology as significantly mor...