Resource Library

Access the latest white papers, research, webcasts, case studies, and more covering a wide range of technology topics, including security, mobility, application development, cloud computing, analytics, data center, enterprise applications, and virtualization.

Filter the library by ...
CLEAR

White Paper | Presented by Tenable

Clouds Are Secure: Are you Using Them Securely

What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.”

White Paper | Presented by Tenable

Gartner: 2018 Market Guide for Vulnerability Assessment

Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report.

White Paper | Presented by Tenable

Cyber Defender Strategies: What Your Vulnerability Assessment Practices Reveal

The cybersecurity community is heavily focused on what attackers are doing. While threat intelligence and vulnerability research is invaluable, it only represents one side of the equation. Far less research has been dedicated to how defenders are responding.

Video/Webcast | Presented by Tenable

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers

Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough.

White Paper | Presented by Tenable

3 Reasons Why DevOps Is a Game-Changer for Security

The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace.

eGuide | Presented by Tenable

Cyber Exposure for Dummies

Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface.

White Paper | Presented by Tenable

Quantifying the Attacker's First-Mover Advantage

Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management.

eGuide | Presented by Tenable

Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV

When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk.

White Paper | Presented by Tenable

3 Reasons Why DevOps Is a Game-Changer for Security whitepaper

The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.

White Paper | Presented by Tenable

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers

Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough.

Load More