Stronger Cloud Security in Five: Securing Your Cloud Identities

|
After covering cloud security posture management (CSPM) and cloud workload protection (CWP) in the first two installments of Tenable’s “Stronger Cloud Security in Five” blog series, today we focus on securing your cloud identities. Protecting them is a tall order, but it’s critical because identities are your cloud security perimeter ... Read More
The State of Cloud Security Platforms and DevSecOps - Melinda Marks

Stronger Cloud Security in Five: How To Protect Your Cloud Workloads

|
In the first installment of Tenable’s “Stronger Cloud Security in Five” blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. Today, we turn to securing cloud workloads, which are the applications and services — along with all the resources they ... Read More

Stronger Cloud Security in Five: The Importance of Cloud Configuration Security

|
Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management.A misconfigured web application firewall. A publicly accessible and unprotected cloud ... Read More
Who's Afraid of AI Risk in Cloud Environments?

Who’s Afraid of AI Risk in Cloud Environments?

|
The Tenable Cloud AI Risk Report 2025 reveals that 70% of AI cloud workloads have at least one unremediated critical vulnerability — and that AI developer services are plagued by risky permissions defaults. Find out what to know as your organization ramps up its AI game.With AI bursting out all ... Read More

Neutralizing Apache Log4j Exploits with Identity-Based Segmentation

|
On December 11, Zscaler’s TheatLabz observed exploit attempts of the Log4j in the wild, analyzed the vulnerability, and recommended protection strategies. Read the blogs here and here. Among the recommendations to mitigate the impact of the vulnerability was to apply app-to-app microsegmentation using identity. This post explains why identity-based segmentation ... Read More