Stronger Cloud Security in Five:
In this sixth installment of Tenableās āStronger Cloud Security in Fiveā blog series, we offer three recommendations that you can quickly roll out to help you expedite, prioritize and fine-tune how you detect and respond to cloud security issues....
Ćffentlich zugƤngliche Secrets: Sicherheitslücken bei Cloud-Daten, die Ihr Unternehmen gefƤhrden
Vertrauliche Daten und Secrets gelangen in die Ćffentlichkeit. How cloud security leaders can shut them down....
Stronger Cloud Security in Five: 3 Quick Ways to Improve Kubernetes Security in GCP
In this fifth installment of Tenableās āStronger Cloud Security in Fiveā blog series, we offer three best practices for quickly hardening your Kubernetes environmentās security in GCP: remove wide inbound access to cluster APIs; remove root permissions from containers; and remove privileged permissi...
Stronger Cloud Security in Five: How DSPM Helps You Discover, Classify and Secure All Your Data Assets
In this fourth installment of Tenableās āStronger Cloud Security in Fiveā blog series, we turn our attention to securing cloud data, a complex endeavor as data grows exponentially and threats become more sophisticated. Check out five DSPM best practices to sharpen your cloud data security and compli...
Die Zukunft von Cloud Access Management: Wie Tenable Cloud Security Just-in-Time-Zugriff neu definiert
Traditional approaches to cloud access rely on static, permanent permissions that are often overprivileged. Learn how just-in-time access completely changes the game....
Stronger Cloud Security in Five: How To Protect Your Cloud Workloads
In the first installment of Tenableās āStronger Cloud Security in Fiveā blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. Today, we turn to securing cloud workloads, which are the applications...
ConfusedComposer: A Privilege Escalation Vulnerability Impacting GCP Composer
Tenable Research discovered a privilege-escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ConfusedComposer. The vulnerability could have allowed an identity with permission (composer.environments.update) to edit a Cloud Composer environment to escalate pri...
Stronger Cloud Security in Five: The Importance of Cloud Configuration Security
Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our āStronger Cloud Security in Fiveā blog series, we outline five best practices for boosting your cloud configuration management....
How To Implement Just-In-Time Access: Best Practices und Erfahrungen
With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, weāll share how we implemented JIT access internally at Tenable using...
ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run
Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions but that have edit permissions on Google Cloud Run revisions. The vulnerability could have allowed...
Who's Afraid of AI Risk in Cloud Environments?
The Tenable Cloud AI Risk Report 2025 reveals that 70% of AI cloud workloads have at least one unremediated critical vulnerability ā and that AI developer services are plagued by risky permissions defaults. Find out what to know as your organization ramps up its AI game....
Choosing the Right Cloud Security Provider: Five Non-Negotiables for Protecting Your Cloud
Protecting your cloud environment for the long term involves choosing a security partner whose priorities align with your needs. Here's what you need to know....