Aggregator
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
From Insight to Action: How Tenable One KPIs Drive Exposure Management Success
Tenable One empowers security teams to go beyond surface-level risk tracking and drive measurable improvements across their security programs. With unified visibility and customizable dashboards, Tenable One makes it easy to monitor the KPIs that matter most, helping teams shift from reactive firefighting to proactive, strategic exposure management.
The importance of KPIs in exposure managementEffective exposure management isn't just about identifying risks — it's about continuously measuring and reducing real exposure. Key performance indicators (KPIs) provide security teams with critical visibility into program effectiveness, helping them prioritize actions, monitor progress and ensure alignment with broader business objectives.
In this blog, we’ll highlight the top KPIs Tenable One customers track to reduce risk, accelerate remediation and demonstrate impact to stakeholders.
Essential KPIs for effective exposure management1. SLA performance metricsTracking service level agreement (SLA) performance is crucial for understanding how consistently your organization meets its remediation targets. This provides insight into whether your security team is keeping pace with exposure management commitments or if risk is accumulating across specific asset groups.
SLA Compliant Assets Over Time: This metric offers visibility into how well your organization is meeting its remediation goals. It highlights which areas are effectively keeping up with exposure resolution and where unresolved risks may be building up.
Tenable One dashboard widget
Top Critical and High Detections by Number of Findings Exceeding SLA: These metrics highlight growing technical debt — findings that remain unresolved beyond their expected timelines, increasing your organization's risk exposure. Consistent tracking allows for early detection of bottlenecks, ownership gaps, or resource constraints before they lead to larger, more challenging risks. By tracking findings approaching SLA, teams gain a proactive view, enabling them to act on critical assets — either through remediation or mitigation – before SLA breaches occur.
Tenable One dashboard widget
Monitoring trends in these KPIs allows organizations to identify periods of declining compliance and pinpoint areas requiring immediate attention.
2. Risk posture and exposure trendsA holistic understanding of your organization's risk posture and evolution over time is fundamental to strategic exposure management.
Cyber Exposure Score (CES) Over Time: This metric provides a high-level view of your organization’s total risk exposure. It aggregates risk across all assets, reflecting how the attack surface evolves and whether remediation efforts are effectively reducing overall risk. Monitoring CES trends helps your security team understand the direction of their risk posture — whether it's improving, plateauing, or worsening — and serves as a strategic signal for leadership.
Tenable One dashboard widget
Assets Exposure Score by Exposure Category (VM, OT, Cloud, etc.): This metric allows you to compare risk posture across different technology stacks, prioritize remediation efforts and allocate resources to areas with the highest average exposure.
Tenable One dashboard widget
CES Exposure Score by Exposure Category and Asset Type: This metric helps identify whether specific asset types within a category disproportionately contribute to cumulative risk, facilitating precise action and enabling data-driven decisions on resource allocation.
Tenable One dashboard widget
Tracking these metrics enables data-driven decisions on resource allocation. It allows for drill-downs into contributing assets and exposure categories, ensuring your efforts are always aligned with the most critical risks.
3. Remediation KPIsEffective remediation tracking is critical to ensuring weaknesses are not merely detected but addressed promptly and consistently. This category of KPIs focuses on measuring the efficiency of vulnerability resolution, tracking how long issues remain open and identifying potential delays or regressions.
Findings by State Over Time: This metric illustrates the progression of findings through "Active," "Fixed," and "Resurfaced" states over time. It offers visibility into remediation volume, closure rates and recurring issues. A steady increase in resurfaced findings can indicate incomplete fixes or recurring vulnerabilities due to configuration drift or asset churn.
Tenable One Dashboard Widget
Findings Age by Severity: This metric highlights which high-severity issues are aging without resolution, serving as a key risk indicator tied to SLA adherence.
Tenable One dashboard widget
Average Remediation Days by Asset Type: This metric helps uncover which teams or environments take longer to remediate issues, pointing to inefficiencies or gaps in ownership.
Tenable One dashboard widget
When tracked collectively, these metrics empower security teams to assess the speed and consistency of remediation; detect bottlenecks and high-risk delays across severity levels and asset owners; and focus remediation efforts where they are most impactful. Organizations can monitor and fix trends, investigate spikes in resurfaced findings, and benchmark asset groups based on average remediation time to drive process improvements.
Transform your exposure management with Tenable OneTenable One provides security teams with unified, customizable risk dashboards and reports. These tools offer the actionable insights needed to track and optimize your exposure management outcomes, empowering your organization to effectively measure, manage and reduce exposure risk.
By effectively tracking these essential KPIs within Tenable One, organizations can:
- Reduce risk and prevent breaches
Make data-driven decisions to focus remediation efforts where they matter most, optimize resource allocation and proactively address critical risks before they escalate.
- Accelerate remediation
Identify remediation bottlenecks and ownership gaps to drive accountability, ensure timely resolution of high-risk issues and track progress to stay on target with SLA commitments.
- Secure budget and buy-in
Communicate program effectiveness and measurable improvements to stakeholders, demonstrating how security initiatives directly support business goals and reduce organizational risk.
Explore how Tenable One can empower your organization to quantify and reduce exposure risk.
Microsoft nOAuth Flaw Still Exposes SaaS Apps Two Years After Discovery
CVE-2025-34032 | Jmol Plugin up to 6.1 on Moodle jsmol.php data cross site scripting (EUVD-2025-18970 / EDB-46881)
CVE-2025-48466 | Advantech Wireless Sensing and Equipment A2.01 B00 Modbus TCP Packet information disclosure (EUVD-2025-18993)
CVE-2025-48470 | Advantech Wireless Sensing and Equipment A2.01 B00 cross site scripting
CVE-2025-48469 | Advantech Wireless Sensing and Equipment A2.01 B00 Public Update Page improper authentication
CVE-2025-6534 | xxyopen/201206030 novel-plus up to 5.1.3 File FileController.java remove resource injection (EUVD-2025-18972)
Fortanix PQC Central boosts post-quantum readiness
Fortanix announced PQC Central, a new feature in the Fortanix Key Insight that reframes how enterprises approach the post-quantum cryptography (PQC) challenge. As quantum computing advances, enterprises face security challenges that threaten current cryptographic standards and demand proactive adaptation—organizations must act now to protect their data and infrastructure. Embedded in Key Insight, which handles cryptographic discovery and risk assessment within the Fortanix Armor platform, PQC Central helps organizations turn PQC migration complexity into actionable insights … More →
The post Fortanix PQC Central boosts post-quantum readiness appeared first on Help Net Security.
Firefox 140 Launches with Critical Code Execution Bug Fix – Update Now
Mozilla has officially released Firefox 140, marking a significant update that addresses multiple security vulnerabilities, including a critical code execution flaw. Users are strongly urged to update their browsers immediately to protect against potential exploits targeting these newly patched weaknesses. Critical Security Fixes in Firefox 140 The highlight of Firefox 140 is the resolution of […]
The post Firefox 140 Launches with Critical Code Execution Bug Fix – Update Now appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Windows 11 Configuration Bug Freezes Update Scanning Process
A recently discovered bug in Windows 11 has caused significant frustration among users, as the operating system’s update scanning process can freeze unexpectedly, leaving systems unable to check for or install critical updates. Microsoft has officially acknowledged the issue and is rolling out fixes to affected devices worldwide. The problem, which primarily impacts users running […]
The post Windows 11 Configuration Bug Freezes Update Scanning Process appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Кажется, мы случайно научили машины жить без нас
CVE-2025-21893分析与复现
CVE-2025-25012 | Elastic Kibana up to 8.17.2 File Upload prototype pollution (EUVD-2025-19084 / Nessus ID 232287)
Mitiga Helios AI accelerates alert triage and incident response for SecOps teams
Mitiga launched Helios AI, an AI powered SOC assistant that supercharges SecOps teams with automated triage, augmented investigation, and accelerated threat remediation across complex multi-cloud environments. The first Helios AI feature available to customers is AI Insights. This automated SOC assistant cuts through alert noise to deliver 90% faster triage and 70x faster alert close rates. Designed specifically for today’s modern, dynamic cloud environment, Helios AI delivers vastly improved operational efficiency, optimizes security team resources, … More →
The post Mitiga Helios AI accelerates alert triage and incident response for SecOps teams appeared first on Help Net Security.
CVE-2025-6543 | Citrix NetScaler ADC/NetScaler Gateway prior 13.1-37.236-FIPS/13.1-59.19/14.1-47.46 memory corruption (CTX694788 / EUVD-2025-19085)
Stellar Cyber updates MITRE ATT&CK Aligned Coverage Analyzer
Stellar Cyber announced its next-generation MITRE ATT&CK Aligned Coverage Analyzer, expanding the capabilities first introduced in the original Coverage Analyzer. This new version transforms visibility into strategy, providing security teams, CISOs, MSSPs, compliance officers, and insurance underwriters with precision in evaluating, optimizing, and communicating their threat detection posture. “Risk managers, enterprise security leaders, and Insurers need modern, dynamic assessment tools to help them understand how certain technology decisions may impact their cyber defense posture and … More →
The post Stellar Cyber updates MITRE ATT&CK Aligned Coverage Analyzer appeared first on Help Net Security.