News
Tenable Launches Tenable One Exposure Management Platform

Tenable has announced the release of Tenable One, an Exposure Management platform that unifies discovery and visibility into all assets and assesses their exposures and vulnerabilities across the entire attack surface for proactive risk management. “Tenable One delivers context-driven risk analytics so security teams can move from reactive fire fighting to prevention. Cybersecurity teams can anticipate and block threats before they can cause damage. The cloud-based platform identifies and assesses assets across the enterprise attack surface to gain a unified view of cyber risk,” the company said.
The average large organization uses more than 130 cybersecurity point solutions, each with its own analytics and reporting. Discrete tools can lead to duplicate efforts and unintended gaps in security programs. This leaves security practitioners no clear path forward to tangibly reduce risk or succinctly communicate an organization’s security posture.
With Tenable One, organizations can easily translate technical asset, vulnerability, and threat data into business insights and actionable intelligence vital for business decision-makers and practitioners. This real-time translation of cyber risk answers stakeholders’ hard-hitting cybersecurity questions – such as “how secure are we?” and “how has our security posture improved over time?” – by providing clear metrics to measure, compare and easily communicate cyber risk.
“One of the biggest challenges enterprises face is the lack of actionable visibility to effectively quantify and respond to real exposure and cybersecurity risk,” said Dr. Michael Mylrea, Sr. Distinguished Engineer, Head of ICS Cybersecurity & Digital Innovation, National Resilience Inc. “The Tenable One Exposure Management Platform could be the game changer the industry needs. Now organizations can pinpoint additional weak spots that could be targeted by attackers and utilize contextual, prioritized reporting to remediate vulnerabilities.”
The Tenable One Platform eliminates noise by bringing an organization’s entire attack surface – on-premises and cloud-based – into a single view. It aggregates vulnerability data across IT infrastructure, web apps, the public cloud, and identity systems. This helps security leaders anticipate the consequences of a cyberattack. Tenable One draws upon the industry’s largest vulnerability management data set from Nessus while understanding relationships between assets, exposures, privileges, and threats across attack paths.
“Our customers put their trust in us to understand their unique attack surfaces, help them predict attacks, and prioritize remediation,” said Rob Watson, SVP of Security Services, eSentire, Inc. “As a leading global Managed Detection and Response provider, the Tenable One Exposure Management Platform gives us a clear advantage in being able to offer customers a new way to visualize and then limit their cyber risk, as well as analytics that measures improvement over time. Together with Tenable, we bring peace of mind and help put businesses globally ahead of disruption.”
At launch, Tenable One introduces three new capabilities that are foundational to exposure management programs:
- Lumin Exposure View– provides clear and concise insights into an organization’s cyber exposure, giving security teams the ability to surface and accurately answer critical questions about the security posture
- Attack Path Analysis (APA)– enables security teams to view attack paths from externally identified points through to critical internal assets to focus mitigation on areas of highest risk
- Asset Inventory– provides users with a centralized view of all assets, including IT, cloud, Active Directory, and Web applications, with the ability to create specific asset tags from a variety of sources and use cases
“Bad actors don’t take a siloed approach to exploit organizations’ attack surfaces, so why are cybersecurity teams operating in vacuums?” said Glen Pendley, Chief Technology Officer, Tenable. “A platform approach to exposure management is the real game changer, surpassing the ineffective and expensive point solution approach that the industry has taken for decades. Tenable One delivers holistic insight into exposures that can serve as a true north for security teams.”
“It’s an exciting time in Dubai as the region recovers post-covid, with the UAE economy expanding strongly. Organisations are looking to invest in technology that will help them capitalise on opportunities and deliver increased functionality. However, against this backdrop we’ve also seen a dramatic uptick in ransomware attacks, nation-state-sponsored threats, and a flood of new vulnerabilities that leave organizations exposed,” said Maher Jadallah, Senior Director of the Middle East and North Africa, Tenable. “When we think of traditional network security, the goal is to fortify the perimeter to prevent threats outside of the network from getting in. However, the way we work today means this approach is no longer feasible. We need to stop simply treating the symptoms of cyber risk and actually look for a cure.”
Tenable One combines vulnerability management, external attack surface management (EASM), identity management, and cloud security data to discover weaknesses before attackers can exploit them. It continuously monitors environments – from traditional IT assets to cloud resources and identity systems – delivering the broadest vulnerability coverage available.
Tenable One enables organizations to:
- Visualize Assets and Vulnerabilities – eliminates areas of known and unknown security risk and builds a baseline for effective risk management. It combines the power of a unified view of all assets and associated software vulnerabilities, poor configurations, and excessive entitlements with a continuous vulnerability assessment.
- Predict and Prioritize – applies context to anticipate the consequences of a cyberattack faster and significantly improves remediation prioritization. It enables security teams to continuously identify and focus on the exploitable attack pathways that create the most risk.
- Effectively Communicate Risk – provides a centralized and business-aligned view of cyber risk and actionable insights. It enables organizations to accurately and effectively communicate to different stakeholders about cyber risk and which actions can most efficiently reduce it.
Cyber Security
ManageEngine Intros Enhanced SIEM with Dual-Layered System for Better Precision in Threat Detection

ManageEngine, the enterprise IT management division of Zoho Corporation, today unveiled the industry’s first dual-layered threat detection system in its security information and event management (SIEM) solution, Log360. The new feature, available in Log360’s threat detection, investigation and response (TDIR) component, Vigil IQ, empowers security operations centre (SOC) teams in organizations with improved accuracy and enhanced precision in threat detection.
A quality SOC ensures people, processes, and cutting-edge technology function well. However, enterprise security is made difficult by staffing shortages and solution orchestration complexities. Following recent upgrades to the security analytics module of Log360 designed to facilitate SOC optimization through key performance metric monitoring, the company has focused on addressing pressing challenges in security operations.
“In a recent ManageEngine study, a majority of respondents revealed that their SOCs are understaffed. These resource-constrained SOCs grapple with significant obstacles, such as process silos and manual investigation of alerts, which are often non-threats, low-priority issues or false positives. These lead to extended detection and response times for actual threats. To overcome these challenges, we recognize the imperative adoption of AI & ML for contextual event enrichment and rewiring threat detection logic,” said Manikandan Thangaraj, vice president at ManageEngine.
“We pioneered a dual-layered, ML approach to heighten the precision and consistency of threat detection. First, Vigil IQ ensures genuine threats are discerned from false positives. Second, the system facilitates targeted threat identification and response. This advanced system significantly improves the accuracy of identifying threats, streamlining the detection process and allowing SOC analysts to focus their valuable time on investigating real threats.”
Key Features of the Dual-Layered Threat Detection System of Vigil IQ in Log360:
Smart Alerts: Vigil IQ, the TDIR module of Log360, now combines the power of both accuracy and precision in threat detection. With its dynamic learning capability, Vigil IQ adapts to the changing nature of network behaviour to cover more threat instances accurately. It will spot threats that get overlooked due to manual threshold settings, thereby improving the detection system’s reliability.
Proactive Predictive Analytics: Leveraging predictive analytics based on historical data patterns, Vigil IQ predicts potential security threats, facilitating the implementation of proactive measures before incidents occur. This predictive intelligence drastically reduces the mean time to detect (MTTD) threats.
Contextual Intelligence: Vigil IQ enriches alerts with deep contextual information, providing security analysts with comprehensive threat insights. This enrichment of alerts with non-event context accelerates the mean time to respond (MTTR) by delivering pertinent, precise information.
News
Proofpoint Appoints Sumit Dhawan as Chief Executive Officer

Proofpoint has announced that Sumit Dhawan has been appointed chief executive officer, effective immediately. Rémi Thomas, Proofpoint’s chief financial officer, who has been acting as Proofpoint’s interim CEO since October 25th, will continue to serve as the company’s CFO. “The Proofpoint board of directors could not be more excited to partner with Sumit as he joins Proofpoint to usher in a new stage of growth,” said Seth Boro, managing partner at Thoma Bravo. “Sumit brings a wealth of valuable experience and expertise in building category-leading, scaled companies and businesses. We are confident his customer-centric passion and strong legacy of leadership will continue to carry Proofpoint’s mission forward in providing people-centric cybersecurity solutions that address some of the most challenging risks facing organizations today.”
Dhawan is a highly respected and seasoned technology leader with a proven track record of building market-leading security, cloud, and end-user computing businesses. In his most recent role as president of VMware, Dhawan was responsible for driving over $13B of revenue and led the company’s go-to-market functions including worldwide sales, customer success and experience, strategic ecosystem, industry solutions, marketing, and communications. Before that, he was chief executive officer of Instart, a cybersecurity business delivering innovations in web application security services. He has held senior executive and general management roles at both VMware and Citrix and has successfully established category-leading businesses at scale.
“Over the years, Proofpoint has built an exceptional brand and is trusted by some of the world’s leading organizations as their cybersecurity partner of choice,” said Sumit Dhawan. “I’m honoured to join a leader at the forefront of cybersecurity innovation and to shepherd its continuing and unwavering commitment to helping organizations across the globe protect people and defend data.”
Proofpoint recently announced it has entered into a definitive agreement to acquire Tessian, a leader in the use of advanced AI to automatically detect and guard against both accidental data loss and evolving email threats. Tessian’s cloud-native, API-enabled inbound and outbound email protection solution will extend Proofpoint’s award-winning offering to address the most frequent form of data loss including, misdirected email and data exfiltration.
Cloud
Google Clarifies the Cause of Missing Google Drive Files

Many Google Drive users recently experienced the unsettling disappearance of their files, prompting concerns. Google has now identified the root cause, attributing the issue specifically to the Google Drive for Desktop app. While assuring that only a limited subset of users is affected, the tech giant is actively investigating the matter and promises timely updates.
To prevent inadvertent file deletion, Google provides the following recommendations:
- Avoid clicking “Disconnect account” within Drive for desktop.
- Refrain from deleting or moving the app data folder, located at:
- Windows: %USERPROFILE%\AppData\Local\Google\DriveFS
- macOS: ~/Library/Application Support/Google/DriveFS
- Optionally, create a copy of the app data folder if there is sufficient space on your hard drive.
Before Google officially addressed the issue, distressed users took to the company’s support forum to report deleted files. One user from South Korea highlighted a particularly severe case where their account reverted to May 2023, resulting in the loss of anything uploaded or created after that date. Additionally, the user emphasised that they had not synced or shared their files or drive with anyone else.
As Google delves deeper into resolving this matter, affected users are advised to heed the provided precautions. The company’s commitment to ongoing updates reflects its dedication to swiftly addressing and rectifying the situation. The incident serves as a reminder of the importance of proactive measures to safeguard digital data, especially as users navigate cloud-based platforms such as Google Drive.
-
Cyber Security4 days ago
Databases Are the Black Boxes for Most Organisations
-
News5 days ago
Proofpoint Appoints Sumit Dhawan as Chief Executive Officer
-
News1 week ago
SonicWall Acquires Solutions Granted Inc.
-
Cyber Security6 days ago
Cybersecurity on a Budget: Affordable Cybersecurity Strategies for Small Businesses
-
Cyber Security5 days ago
ManageEngine Intros Enhanced SIEM with Dual-Layered System for Better Precision in Threat Detection
-
Cloud5 days ago
Google Clarifies the Cause of Missing Google Drive Files