Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable ブログ

September 11, 2025

Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale

Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an unimpeded view of your multi-cloud and hybrid environment.

2025/9/10

プロアクティブセキュリティへの移行: 成功する MSSP のために Tenable Exposure Management を活用する

An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize actions and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re…


2025/9/10

新しい Tenable レポート: 複雑さと脆弱な AI セキュリティがクラウド環境を危険にさらす

This survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a…


2025/9/9

マイクロソフト、2025 年 9 月の月例セキュリティ更新プログラムで 80 件の CVE を修正 (CVE-2025-55234)

Microsoft addresses 80 CVEs, including eight flaws rated critical with one publicly disclosed.


2025/9/9

サイロの打破: クラウドのセキュリティリスクをエコシステム視点で捉える

A disjointed approach to cloud security generates more noise than clarity, making it hard for you to prioritize what to fix first. Learn how Tenable dissolves this challenge by integrating cloud security into a unified exposure management platform – giving you the context to pinpoint your…


2025/9/8

情報セキュリティリスク: 設定ミスやエラーが重要な認証情報の漏洩につながる

Despite all the innovation in cloud computing, one persistent issue lurks in the shadows to undermine security hygiene - poor secrets management. Here, we explain compromised secrets’ impacts and causes and offer concrete risk-mitigation recommendations.


2025/9/8

ICYMI: アタックサーフェス管理、プロアクティブセキュリティなどに関するエクスポージャーマネジメントアカデミー

毎週月曜日、Tenable のサイバーエクスポージャー管理アカデミーでは、脆弱性管理からサイバーエクスポージャー管理への移行に必要な、実用的で現実的なガイダンスを提供しています。 In this post, we look back on the guidance and best practices shared in the past several months.


2025/9/5

サイバーセキュリティニュース: 重要インフラの OT および産業用制御システム、IoT デバイス、ネットワークインフラのセキュリティ対策に関する専門家のアドバイス

Destructive cyber attacks against critical infrastructure have unfortunately become increasingly frequent. Just last week, multinational government agencies blared the alarm about a global cyber espionage campaign targeting critical infrastructure networks. With this type of cyber threat in the…


2025/9/4

アイデンティティファーストのセキュリティ: クラウドの最大のリスク要因を軽減

Compromised credentials are now the leading cause of cloud breaches, making identity your most critical attack surface. A new IDC white paper explores why this shift is happening and where traditional defenses fall short. Read on to learn how Tenable's identity-first approach turns this risk into…


2025/9/3

Salesforce と Salesloft のドリフトインシデントに対する Tenable の対応

At Tenable, we take transparency seriously, especially when it comes to protecting our customers’ data. We recently learned of a widespread data theft campaign involving the integration of Salesforce and Salesloft Drift, and Tenable was among the many organizations impacted. In line with our…


役立つサイバーセキュリティ関連のニュース

Tenable エキスパートからのタイムリーな警告とセキュリティガイダンスを見逃さないように、メールアドレスをご入力ください。

ランサムウェアのエコシステムとは

レポートをダウンロード: