Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

White Paper | Presented by Tenable

Clouds Are Secure: Are you Using Them Securely

What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.”

White Paper | Presented by Tenable

Gartner: 2018 Market Guide for Vulnerability Assessment

Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report.

White Paper | Presented by Tenable

3 Reasons Why DevOps Is a Game-Changer for Security whitepaper

The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.

White Paper | Presented by Tenable

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers

Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough.

eGuide | Presented by Tenable

Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV

When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.