logo
Tenable unveils AI Exposure to manage enterprise generative AI risk

Tenable unveils AI Exposure to manage enterprise generative AI risk

Techday NZ07-08-2025
Tenable has introduced an expansion of its Tenable One platform, specifically focused on tackling the risks introduced by enterprise use of generative artificial intelligence tools.
The new service, Tenable AI Exposure, is intended to provide organisations with the means to gain visibility, manage risks, and enforce policies surrounding widely-adopted generative AI platforms such as ChatGPT Enterprise and Microsoft Copilot.
Visibility into AI use
As adoption of generative AI accelerates across businesses, concerns are increasing over the visibility of these tools within corporate environments. Security teams often face challenges in understanding how employees use these technologies, which forms of sensitive data might be at risk, and how threat actors could exploit these new vectors.
Tenable AI Exposure aims to address these concerns by enabling organisations to discover both approved and unapproved AI usage, identify potential exposures, and apply governance controls over how AI is integrated into daily operations. Simply discovering shadow AI isn't enough. A true exposure management strategy requires an end-to-end solution that lets organisations discover their entire AI footprint, manage the associated risks, and govern its use according to their policies. That's exactly what we are delivering today," said Steve Vintz, Co-CEO and CFO, Tenable. "With Tenable AI Exposure, we're giving organisations the visibility and control they need to safely embrace the promise of generative AI without introducing unacceptable risk. This is a critical step in the evolution of exposure management.
Features of Tenable AI Exposure
The company highlighted several new components of the solution. Tenable AI Exposure includes comprehensive AI discovery functionality, combining insights from the firm's existing Tenable AI Aware offering, scans from its AI Security Posture Management, and continuous monitoring features. This provides detailed understanding of user interactions, data flows, and activities that could introduce risk within the enterprise.
Risk management and prioritisation tools help organisations identify, categorise, and address risks associated with generative AI, including the possibility of sensitive data leakage, misconfigurations, and unsafe external integrations. The capability extends to managing exposures involving forms of sensitive data such as personally identifiable information, payment card information, and protected health information.
For operational governance, Tenable AI Exposure introduces policy enforcement mechanisms, enabling security teams to control how AI is used according to established organisational standards. These controls can be used to mitigate threats such as prompt injection attacks, jailbreak attempts, and potential output manipulation by malicious actors.
Tenable stated that the solution is agentless and can be deployed for enterprise-wide coverage in minutes. It integrates within the Tenable One platform, providing a consolidated view of risk across a corporation's attack surface.
Unified approach to exposure management
The company noted that the integration of Tenable AI Aware, its AI Security Posture Management solution, and new governance capabilities offers users the ability to discover, manage, and secure the use of AI in their organisations in a single workflow.
Tenable AI Exposure is currently accessible through a private customer preview programme, with plans for broader availability by the end of 2025.
The expansion reflects the increasing imperative for organisations to manage emerging technology risk and maintain oversight of AI adoption as it becomes more ingrained in enterprise settings.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

SharePoint flaw sparks urgent patch call amid new RCE threat
SharePoint flaw sparks urgent patch call amid new RCE threat

Techday NZ

time2 days ago

  • Techday NZ

SharePoint flaw sparks urgent patch call amid new RCE threat

Cybersecurity experts are urging organisations to take immediate action following the disclosure of a critical vulnerability in Microsoft SharePoint, as highlighted in the latest Patch Tuesday security update. This newly identified issue, designated CVE-2025-49712, is raising alarms given its potential to facilitate remote code execution (RCE) when combined with other known flaws. Saeed Abbasi, Senior Manager of Security Research at Qualys Threat Research Unit, described the vulnerability as a significant threat, especially coming on the heels of last month's "ToolShell" zero-day attacks. Abbasi commented, "This RCE demands authentication but pairs dangerously with known authentication bypasses. Attackers chaining this with prior flaws could achieve full server compromise, and data exfiltration." He added that while there have been no reports of exploitation in the wild so far, experience suggests such gaps can be closed rapidly as threat actors adapt their techniques. Abbasi urged organisations to "prioritise and patch all SharePoint updates, rotate keys, and eliminate internet exposure," stressing that delaying mitigation efforts could trigger both regulatory scrutiny and significant data breaches. "SharePoint's exploit streak isn't over," Abbasi warned, underscoring the need for proactive management of the platform's security posture. The August Patch Tuesday update from Microsoft addressed a total of 107 Common Vulnerabilities and Exposures (CVEs). Of these, 13 were rated critical and 91 as important. Elevation of privilege (EoP) vulnerabilities accounted for 39.3% of the fixes, while remote code execution issues made up 32.7% - a pattern consistent with trends observed in previous months. Satnam Narang, Senior Staff Research Engineer at Tenable, noted that "this month's release highlights an upward trend in post-compromise vulnerabilities over code execution bugs. For the second consecutive month, elevation of privilege vulnerabilities represented the bulk of CVEs patched this month." Narang referred to the patch for CVE-2025-53779, a privilege escalation flaw known as BadSuccessor, describing its immediate impact as limited due to the specific prerequisites needed for exploitation. "An attacker must have at least one domain controller in a domain running Windows Server 2025 in order to achieve domain compromise," he explained, making it a targeted rather than broad-based risk. SharePoint vulnerabilities continued to receive particular attention, with Narang observing, "It might seem like déjà vu because Microsoft patched two more SharePoint vulnerabilities this month: a remote code execution flaw (CVE-2025-49712) and an elevation of privilege bug (CVE-2025-53760). After the chaos that ensued with the exploitation of the ToolShell vulnerabilities, any new SharePoint vulnerabilities understandably raise concerns." Since 2022, Microsoft has patched an average of 21.7 SharePoint vulnerabilities annually, with 2023 seeing a high of 25. With 20 already addressed in the current year, the record may soon be exceeded, according to Narang. Despite this volume of patches, he noted, "only three were exploited in the wild (CVE-2023-29357, CVE-2023-24955, CVE-2024-38094) in addition to the three ToolShell vulnerabilities (CVE-2025-49706, CVE-2025-49704, CVE-2025-53770)," though another, CVE-2025-53771, may also have been exploited based on emerging reports. Security practitioners highlight the recurring threat presented by SharePoint vulnerabilities, which can serve as gateways for lateral movement and deeper network compromise if not promptly addressed. With a rising tally of disclosed flaws and only a handful exploited so far, experts are calling for continued vigilance, patching discipline, and the hardening of exposed enterprise collaboration systems.

Tenable unveils AI Exposure to manage enterprise generative AI risk
Tenable unveils AI Exposure to manage enterprise generative AI risk

Techday NZ

time07-08-2025

  • Techday NZ

Tenable unveils AI Exposure to manage enterprise generative AI risk

Tenable has introduced an expansion of its Tenable One platform, specifically focused on tackling the risks introduced by enterprise use of generative artificial intelligence tools. The new service, Tenable AI Exposure, is intended to provide organisations with the means to gain visibility, manage risks, and enforce policies surrounding widely-adopted generative AI platforms such as ChatGPT Enterprise and Microsoft Copilot. Visibility into AI use As adoption of generative AI accelerates across businesses, concerns are increasing over the visibility of these tools within corporate environments. Security teams often face challenges in understanding how employees use these technologies, which forms of sensitive data might be at risk, and how threat actors could exploit these new vectors. Tenable AI Exposure aims to address these concerns by enabling organisations to discover both approved and unapproved AI usage, identify potential exposures, and apply governance controls over how AI is integrated into daily operations. Simply discovering shadow AI isn't enough. A true exposure management strategy requires an end-to-end solution that lets organisations discover their entire AI footprint, manage the associated risks, and govern its use according to their policies. That's exactly what we are delivering today," said Steve Vintz, Co-CEO and CFO, Tenable. "With Tenable AI Exposure, we're giving organisations the visibility and control they need to safely embrace the promise of generative AI without introducing unacceptable risk. This is a critical step in the evolution of exposure management. Features of Tenable AI Exposure The company highlighted several new components of the solution. Tenable AI Exposure includes comprehensive AI discovery functionality, combining insights from the firm's existing Tenable AI Aware offering, scans from its AI Security Posture Management, and continuous monitoring features. This provides detailed understanding of user interactions, data flows, and activities that could introduce risk within the enterprise. Risk management and prioritisation tools help organisations identify, categorise, and address risks associated with generative AI, including the possibility of sensitive data leakage, misconfigurations, and unsafe external integrations. The capability extends to managing exposures involving forms of sensitive data such as personally identifiable information, payment card information, and protected health information. For operational governance, Tenable AI Exposure introduces policy enforcement mechanisms, enabling security teams to control how AI is used according to established organisational standards. These controls can be used to mitigate threats such as prompt injection attacks, jailbreak attempts, and potential output manipulation by malicious actors. Tenable stated that the solution is agentless and can be deployed for enterprise-wide coverage in minutes. It integrates within the Tenable One platform, providing a consolidated view of risk across a corporation's attack surface. Unified approach to exposure management The company noted that the integration of Tenable AI Aware, its AI Security Posture Management solution, and new governance capabilities offers users the ability to discover, manage, and secure the use of AI in their organisations in a single workflow. Tenable AI Exposure is currently accessible through a private customer preview programme, with plans for broader availability by the end of 2025. The expansion reflects the increasing imperative for organisations to manage emerging technology risk and maintain oversight of AI adoption as it becomes more ingrained in enterprise settings.

CrowdStrike & OpenAI enhance SaaS security with AI agent oversight
CrowdStrike & OpenAI enhance SaaS security with AI agent oversight

Techday NZ

time06-08-2025

  • Techday NZ

CrowdStrike & OpenAI enhance SaaS security with AI agent oversight

CrowdStrike has announced a new integration with OpenAI aimed at improving security and governance for AI agents used throughout the software-as-a-service (SaaS) landscape. The company's Falcon Shield product now features integration with the OpenAI ChatGPT Enterprise Compliance API, providing the ability to discover and manage both GPT and Codex agents created within OpenAI's ChatGPT Enterprise environment. This expansion supports more than 175 SaaS applications, addressing the increasing use of agentic AI in business operations. AI and the expanding attack surface As enterprises leverage AI agents to automate workflows and increase efficiency, the number of such agents is rising rapidly. CrowdStrike highlighted that while these agents deliver operational benefits, they also introduce new security challenges. Organisations may struggle to monitor agent activities, understand the data and systems these agents can access, and determine who is responsible for creating or controlling them. Autonomous AI agents frequently operate with non-human identities and persistent privileges. If a human identity associated with such an agent is compromised, there is potential for adversaries to use the agent to exfiltrate data, manipulate systems, or move across key business applications undetected. The proliferation of these agents increases the attack surface and can significantly amplify the impact of a security incident. Enhanced visibility and governance Falcon Shield's new capabilities are intended to help organisations address these risks by mapping each AI agent to its human creator, identifying risky behaviour, and aiding real-time policy enforcement. When combined with the company's Falcon Identity Protection, CrowdStrike's platform aims for unified visibility and protection for both human and non-human identities. "AI agents are emerging as superhuman identities, with the ability to access systems, trigger workflows, and operate at machine speed," said Elia Zaitsev, chief technology officer, CrowdStrike. "As these agents multiply across SaaS environments, they're reshaping the enterprise attack surface, and are only as secure as the human identities behind them. Falcon Shield and Falcon Identity Protection help secure this new layer of identity to prevent exploitation." Key features of the Falcon Shield integration include the discovery of embedded AI tools such as GPTs and Codex agents across various platforms, including ChatGPT Enterprise, Microsoft 365, Snowflake, and Salesforce. This is designed to give security teams increased visibility into AI agent proliferation within an organisation's digital environment. Accountability and threat containment The integration links each AI agent to its respective human creator. According to CrowdStrike, this supports greater accountability and enables organisations to trace access and manage privileges using contextual information. Falcon Identity Protection works alongside these capabilities to further secure human identities associated with AI agent activity. CrowdStrike stated that the system is capable of analysing identity, application, and data context to flag risks such as overprivileged agents, GPTs with sensitive abilities, and any unusual activity. Threats can be contained automatically using Falcon Fusion, the company's no-code security orchestration, automation, and response (SOAR) engine, which can block risky access, disable compromised agents, and trigger response workflows as required. Unified protection approach The product suite combines Falcon Shield, Falcon Identity Protection, and Falcon Cloud Security to provide what the company describes as end-to-end visibility and control over AI agent activity, tracking actions from the person who created an agent to the cloud systems it is able to access. Organisations using agentic AI in their operations are being encouraged to consider tools and approaches that not only monitor the agents themselves but also strengthen oversight of the human identities behind these digital entities.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store