Product Announcements

Forum Discussion

dschreiber's avatar
dschreiber
Product Team
6 months ago

Tenable Product and Research Update Newsletter - April 2025...

Tenable Product and Research Update Newsletter - April 2025

Greetings! Check out our April newsletter to learn about the latest product and research updates, upcoming and on-demand webinars, and educational content—all to help you get more value from your Tenable solutions.

>> Click here to view a PDF of the entire newsletter.

Tenable Training and Product Education

Tenable Certifications Now Approved for CompTIA CEUs

Tenable is now a CompTIA Pre-Approved Training Provider. Customers who earn an eligible Tenable product certification can apply 29 continuing education units (CEUs) toward renewal of their active CompTIA Security+ CE certification.

Recognized certifications include:

  • Tenable Vulnerability Management Specialist and Expert
  • Tenable Security Center Specialist and Expert
  • Tenable OT Security Specialist

To receive CEU credit, customers must upload their certification documentation via the CompTIA portal at https://www.certmetrics.com/comptia. Customers who earned an eligible Tenable product certification in 2024 may also retroactively submit their documentation to CompTIA for CEU credit.

Tenable Cloud Security

Reminder: Tenable Cloud Security requires you to log in to view documentation. To access the documentation or try Tenable Cloud Security, contact your account manager or request a demo

Tenable Cloud Security is now FedRAMP® Authorized

It’s official: Tenable Cloud Security is now Federal Risk and Authorization Program (FedRAMP®) moderate authorized. Federal agencies can use Tenable’s actionable cloud security platform to rapidly expose and close security gaps caused by cloud misconfigurations, risky entitlements, and vulnerabilities. You can acquire FedRAMP-authorized Tenable Cloud Security through Tenable One FedRAMP for U.S. Government or Tenable Cloud Security FedRAMP for U.S. Government and use it to manage both your FedRAMP and commercial cloud footprints through a single pane of glass. 

For more information, view the press release.

Kubernetes Admission Controller and Unified Helm Charts 

Gain tighter control over your Kubernetes and OpenShift clusters with ease using the new Tenable Cloud Security Admission Controller. This new capability intercepts API requests to enforce policies, validate configurations, and ensure only compliant resources are created or modified. It also allows you to easily enable or disable policies, set policies to deny or alert on changes, and edit policy variables without needing to write or know rego. Access the Admission Controller and more, and keep your environments secure and up to date by installing the newly launched unified Helm Chart, which offers:

  • Automatic access to new features, including the Admission Controller, agent-based vulnerability scanning, and (soon) malware scanning
  • Optimized resource allocation
  • Flexible container image registry support for pulling images from Tenable’s container image registry or configuring your private registry

For more information on the K8s Admissions Controller, see the demo clip.

Detect and Fix Issues at the Source by Scanning Private (Internal) AMIs 

If you are using AMIs to launch EC2s, you can now scan them to detect and fix issues at source without needing additional permissions. To do so, just enable the feature; the existing VM scan permissions will apply. Note that the use of this capability is billed at one billable resource per image (AMI instance) scanned. To find out more, see the documentation.

Replace Microsoft Entra Permissions Management with Tenable Cloud Security

With end-of-life announced for Microsoft Entra Permissions Management, consider Tenable Cloud Infrastructure Entitlement Management (CIEM) and Tenable Just in Time (JIT) your ideal replacement choice. Our Gartner-recognized CIEM solution provides all the functionality of Microsoft Entra Permissions Management and more, with consistent, same-level identity security across Azure, AWS, and Google Cloud. Likewise, Tenable JIT helps you eliminate the use of standing permissions to cloud resources and complements CIEM for more effective least privilege. You can license Tenable CIEM and JIT as part of Tenable Cloud Security to holistically secure your full cloud stack. 

5 Replies

  • Tenable Vulnerability Management

    The new “Vulnerability Age: Managing SLAs with VPR” widget is now live in TVM dashboards

    This new matrix widget lets you quickly assess vulnerabilities by VPR and age. It is especially useful for tracking compliance with SLAs and policies. Columns display the counts of vulnerabilities discovered within a specified time period, and rows categorize vulnerabilities by VPR range.

    The widget is available in these dashboards:

    • PCI Quarterly Internal Vulnerability Scanning (Explore)
    • Vulnerability Management Overview (Explore)
    • PCI Scan Monitoring (Explore)
    • Fundamental Cyber Hygiene Report Card (Explore)

    Find it in the widget library under its name and add it to your custom dashboards.

    Note: Not on the TVM landing page yet? Simply add the Vulnerability Management Overview (Explore) dashboard from the library.

    Asset Criticality Rating (ACR)/Asset Exposure Scores (AES) Updates

    Tenable Vulnerability Management now includes a new AES (beta) score. We have enhanced our prioritization models with diversified data sources and updated algorithms to further improve exposure score accuracy. These changes should enhance remediation prioritization efforts and explainability. Please check out the knowledge base for more details on algorithm changes.

  • Tenable Patch Management

    Tenable Patch Management now supports Cross-Platform

    We’re pleased to announce that Tenable Patch Management now supports Mac and Linux operating systems in addition to Windows. With this release, we now cover over 20,000 third-party applications. 

    Please click here for a full list of covered applications, and note that we are always adding more. Check out the related Documentation for additional information and visit the Downloads Portal to download the latest version. 

    Tenable Identity Exposure

    Find Hidden Risks in Exchange and Active Directory

    Attackers target outdated servers and messy AD groups. New Indicators of Exposure (IoEs) help you spot and fix these weaknesses—fast.

    Detect Outdated Exchange Servers

    • Find end-of-life Exchange servers
    • Flag missing critical updates
    • Reduce ransomware and breach risks

     See Exchange Server Detection ➔

    Clean Up Non-Essential AD Groups

    • Flag empty and single-member groups
    • Consolidate alerts for faster remediation
    • Strengthen AD security and shrink your attack surface

     See AD Group Hygiene ➔

    Secure your infrastructure by anticipating threats, detecting breaches, and responding to incidents and attacks. See all Tenable Indicators of Exposure.

    Tenable OT Security

    Coming soon: Deeper visibility. Smarter asset intelligence. Greater control.

    From enhanced visibility and asset discovery to hardware lifecycle intelligence and a new flexible, Windows-based deployment option—this release empowers security teams to manage cyber risk across converged IT/OT environments with confidence.

    Join us at  11 am EDT on May 7 for a live customer update and be among the first to see what’s new in Tenable OT Security 4.2. Register here.

    Now available: Tenable OT Security 4.1

    Our latest release delivered powerful new capabilities for on-prem and hybrid environments—streamlining security operations, simplifying NERC-CIP compliance, and enhancing visibility across complex OT/IoT networks. Additional enhancements include expanded support for electrical substations and threat detection for AI-related risk.

    Upgrade to the latest version to unlock the full potential of your security program. For more details, check out the release notes or watch the customer update replay.

    Vulnerability and device coverage updates

    Recent coverage updates published by Tenable Research include end-of-life plugins for Rockwell devices and plugins for multiple CVEs with critical CvSS ratings for devices from Wiesemann & Theis, Elspec, Sprecher Automation, Schneider Electric, and others. 

    Find a detailed breakdown of the latest plugins and supported devices here.

    Ecosystem

    PyTenable 1.7.4

    Tenable is pleased to release pyTenable v1.7.4. This update includes significant usability improvements, including:

    • TASM API improvements
    • Updated export sub-pkg
    • Added metadata change field to the default response

    For details, refer to the releases page in GitHub and Tenable Documentation.

  • Tenable Web App Scanning

    Tenable WAS now supports Pause Windows, giving you precise control over when scans can run. This is ideal for production environments where scanning during peak hours could impact performance. Define windows of time when scans should automatically pause, and they’ll resume right where they left off—no more restarting from scratch or breaking scans into pieces.

    This release also includes manual Pause and Resume controls, available via both the user interface and API. Pause Windows and Pause/Resume both support multi-FQDN scans, helping ensure broader coverage with less disruption.

    For more information, see the Tenable Web App Scanning documentation.

    Tenable Webinars

    CUSTOMER UPDATE WEBINARS

    Tune in for product updates, demos, how-to advice, and live Q&A to help you get more value from your investment in Tenable solutions. 

    LIVE  

    May 2025 

    ON-DEMAND 

    April 2025

    • Tenable WAS: Explore the recent Tenable Attack Surface Management integration with Tenable WAS.
    • Tenable Nessus: Identify potential attack paths using port scanning and service discovery.
    • Tenable Vulnerability Management: Create scans using the Tenable API and PyTenable.
    • Tenable One: Learn how new Tenable One updates streamline navigation and improve access to important exposure context.
    • Tenable Security Center: Learn how to do asset-based reporting using the Iterator in Tenable Security Center.

    CUSTOMER OFFICE HOURS 

    These are recurring ask-me-anything sessions for Tenable Security Center, Tenable Vulnerability Management, Tenable Cloud Security, Tenable Identity Exposure, and Tenable OT Security. Time-zone-appropriate sessions are available for the Americas, Europe (including the Middle East and Africa), and Asia Pacific (APAC). Learn more and register here.

    OTHER WEBINARS OF INTEREST

    FOR MORE WEBINARS

    Please visit tenable.com/webinars for the most up-to-date schedule.

    Tenable Research

    Security Response Team

    CVE-2025-1097, CVE-2025-1098, CVE-2025-1974, CVE-2025-24513, CVE-2025-24514: Frequently Asked Questions About IngressNightmare: Five vulnerabilities in the Ingress NGINX Controller for Kubernetes, collectively known as IngressNightmare.

    Tenable Research reports and blogs

    Who's Afraid of AI Risk in Cloud Environments? The Tenable Cloud AI Risk Report 2025 reveals that 70% of AI cloud workloads have at least one unremediated critical vulnerability, and that risky permissions defaults plague AI developer services. Find out what to know as your organization ramps up its AI game.

    Vulnerability detections

    Over 1,5766 new plugins were published between March 14 and April 11, with 178 having a CVSSv3 severity rating of critical.