エージェント型 AI セキュリティ:サイバーハイジーンの不備がグローバルな侵害に発展するのを防ぐ
The Claude Code weaponization reveals the true threat: The democratization and orchestration of existing attack capabilities. It proves that neglecting fundamental cyber hygiene allows malicious AI to execute massive-scale attacks with unprecedented speed and low skill.
AI 主導のサイバー攻撃に対する実践的な防御
The era of AI-driven cyberattacks is here, demonstrated by the recent abuse of an agentic AI tool in a broad espionage campaign. Defense requires a new approach centered on preemptive exposure management, combining reinforced security fundamentals with defining the new AI attack surface and…
サイバーセキュリティニュース: セキュリティ専門家が、エクスポージャー管理、リスクの優先順位付け、ツールの拡散などについて語る
Want to take a peek at your fellow cybersecurity practitioners’ thoughts on topics such as exposure response, patch management, and security tool sprawl? In case you missed them, we’re revisiting some of our most insightful webinar polls of 2025. Check out what your peers had to say!
オーストラリアの重要インフラ事業者に対するサイバーセキュリティ規制
Australia's critical infrastructure leaders must master a complex array of regulations and frameworks, including the SOCI Act, SLACI Act, and AESCSF. The requirements call for board-level compliance, incident reporting, and bolstering OT cyber resilience against rising geopolitical threats.
急速な AI 導入が生み出すエクスポージャーギャップ
As organizations rush to deploy AI, enterprise defenses are struggling to keep up. This blog explores the emerging AI exposure gap — the widening divide between innovation and protection — and what security leaders can do to close it.
Tenable、エクスポージャー評価プラットフォームを対象とした初の Gartner® Magic Quadrant™ for Exposure Assessment Platforms でリーダーグループに選出
エクスポージャー管理の実行能力がお客様によって証明されています。ミッションの一部として Tenable を信頼してくださり、誠にありがとうございます。
サイバーセキュリティニュース: AI 攻撃の検出と防止、そして AI システムのセキュリティ対策に関する重要なアドバイス
As organizations eagerly adopt AI, cybersecurity teams are racing to protect these new systems. In this special edition of the Cybersecurity Snapshot, we round up some of the best recent guidance on how to fend off AI attacks, and on how to safeguard your AI systems.
Tenable、Latio 2025 年クラウドセキュリティ市場レポートで CTEM リーダーに選出
Tenable has been named a Continuous Threat Exposure Management (CTEM) Leader in Latio’s 2025 Cloud Security Market Report. This recognition is based on rigorous product testing conducted by Latio founder and lead analyst James Berthoty.
サイバーセキュリティ啓発月間はセキュリティリーダーにとっても重要
Think you know all there is to know about cybersecurity? Guess again. Shadow AI is challenging security leaders with many of the same issues raised by other “shadow” technologies. Only this time, it’s evolving at breakneck speed.
F5、「BIG-IP 」の侵害を公表: 今すぐ対処が必要な 44 件の脆弱性
Partnering with an EDR vendor after a nation-state has already stolen your source code isn’t innovation — it’s a gamble. You don’t build a fire extinguisher while the house is burning. You find every spark before it becomes the next inferno.Key takeaways:F5’s BIG-IP is used to secure everything…
サイバーリスクの人的コスト: エクスポージャー管理でサイバーセキュリティ専門家の燃え尽き症候群を防ぐ
サイバーリスクの本当の代償は、人にあります。サイロ化されたツールやバラバラな運用体制は、ビジネスを危険にさらすだけでなく、チームにも深刻な負担を与えています。今こそ、統合的かつ事前対応型のアプローチで、サイバーセキュリティの摩擦を取り除くときです。
購入するか構築するかのジレンマ:エクスポージャー管理における DIY アプローチの落とし穴
Some security teams are taking a do-it-yourself approach to exposure management, according to a recent study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable. But are they really ready for the hidden costs and challenges that come with a homegrown system?