{"id":101191,"date":"2024-09-17T10:34:03","date_gmt":"2024-09-17T09:34:03","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=101191"},"modified":"2025-04-23T08:57:10","modified_gmt":"2025-04-23T07:57:10","slug":"bernard-montel-tenable-navigating-latest-cybersecurity-trends","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/","title":{"rendered":"Bernard Montel, Tenable: Navigating the latest cybersecurity trends"},"content":{"rendered":"\n<p>As organisations worldwide continue to grapple with an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.<\/p>\n\n\n\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernad.jpeg\" alt=\"\" class=\"wp-image-101192 lazyload\" style=\"width:219px;height:auto\"\/><noscript><img fetchpriority=\"high\" decoding=\"async\" width=\"299\" height=\"299\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernad.jpeg\" alt=\"\" class=\"wp-image-101192 lazyload\" style=\"width:219px;height:auto\" srcset=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernad.jpeg 299w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernad-150x150.jpeg 150w\" sizes=\"(max-width: 299px) 100vw, 299px\" \/><\/noscript><\/figure>\n\n\n\n<p>Ahead of <a href=\"https:\/\/cybersecuritycloudexpo.com\/europe\/\">Cyber Security &amp; Cloud Expo Europe<\/a>, Bernard Montel, EMEA Technical Director and Security Strategist at <a href=\"https:\/\/www.tenable.com\/\">Tenable<\/a>, shed light on the shifts in cybersecurity over the past five years and offers valuable insights into the challenges and trends shaping the industry today.<\/p>\n\n\n\n<p>In the face of increasingly sophisticated threats, Montel&#8217;s perspectives on risk management, proactive security measures, and the role of emerging technologies like AI in cybersecurity offer invaluable guidance for navigating these turbulent waters.<\/p>\n\n\n\n<p><strong>Cloud Tech: How has the cybersecurity landscape changed in the last five years?<\/strong><\/p>\n\n\n\n<p><strong>Bernard Montel:<\/strong> The global pandemic dramatically changed the way we work and for some organisations this transition happened practically overnight. Instead of travelling to offices or other places of work we were connecting to systems and resources remotely.&nbsp;<\/p>\n\n\n\n<p>From a cybersecurity standpoint this has had a massive impact in the way we need to think about security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The home network, which had never been secured, suddenly became an extension of the corporate network. Home routers were the only way employees could gain access to resources and expanded the threat landscape significantly.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The use of Virtual Private Networks (VPNs) and multi-factor authentication (MFA) was the only way to secure these connections.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As organisations moved resources to the cloud, negating the need for VPNs, it simplified life for remote workers and provided a layer of security for organisations.<\/li>\n<\/ul>\n\n\n\n<p>If we could retain one single post-pandemic change, it is the acceleration of cloud services (Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), etc.) The cloud has changed the way we work today removing the need for physical racks of machines, accessible only remotely. There is no need to be hardwired to the corporate network to be secure.<\/p>\n\n\n\n<p>Of course we still have some on-prem solutions deployed and used. However, the vast majority of organisations operate a hybrid environment, combining a blend of private and public cloud with on-prem resources.&nbsp;<\/p>\n\n\n\n<p>Today\u2019s new normal means the \u201ccastle\u201d represented by the \u201ccorporate network,\u201d is now fragmented\u2014with the result that the attack surface has never been so large or more dynamic.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>CT: What are the latest cybersecurity trends?<\/strong><\/p>\n\n\n\n<p><strong>BM:<\/strong> Ransomware is still the top threat today. The number of attacks experienced by organisations daily is growing and breaches are breaking more and more records in terms of number of records breached or volume of data exfiltrated.<\/p>\n\n\n\n<p>Cloud security is another real challenge for all organisations. The move to cloud resources forces security teams to rethink the way they handle security. In addition, IoT devices connected to the cloud further extends the attack surface. The traditional perimeter approach, with endpoint and\/or server the focus of security practices, is almost useless when we are talking about serverless microservices, and containers.<\/p>\n\n\n\n<p>Identity has returned as the main focus of concern. 25 years ago we talked about the challenge of managing identities with the beginning of I&amp;AM. The problem is still very much evident, but far more complex: federated identities, MFA, Active Directory and EntraID, combined with all the cloud-based identities with AWS, Azure, GCP\u2026 the list goes on.<\/p>\n\n\n\n<p>AI is, of course, like in any other technology, another area of focus. Attackers are just beginning to realise the capabilities it offers and, as defenders, it&#8217;s vital we also determine how to utilise the technology.&nbsp;<\/p>\n\n\n\n<p>Harnessing the power and speed of <a href=\"https:\/\/www.cloudcomputing-news.net\/news\/generative-ai-is-a-top-driver-for-cloud-investments\/\">generative AI<\/a> \u2013 such as Google Vertex AI, OpenAI GPT-4, LangChain, and many others \u2013 it is possible to return new intelligent information in minutes. This can be used to accelerate research and development cycles in cybersecurity, to search for patterns and explain what\u2019s found in the simplest language possible. Harnessing the power of AI enables security teams to work faster, search faster, analyse faster, and ultimately make decisions faster.<\/p>\n\n\n\n<p><strong>CT: What should organisations keep in mind today when thinking of their security risks?<\/strong><\/p>\n\n\n\n<p><strong>BM:<\/strong> What we need to keep in mind is that, in the majority of instances, it is a known vulnerability that allows threat actors an entry point to the organisation\u2019s infrastructure. Having gained entry threat actors will then look to further infiltrate the organisation to steal data, encrypt stems or other nefarious activities.&nbsp;<\/p>\n\n\n\n<p>Non-malicious misconfigurations \u2013 so basic human error, from configurations left \u2018by default\u2019 to a developer submitting code through a DevOps high speed cycle \u2013 these mistakes are human. However, not checking for these misconfigurations leaves the doors wide open to attackers.&nbsp;<\/p>\n\n\n\n<p>Often there is a belief that, because an organisation is \u2018smaller,\u2019 they won\u2019t be a target for attacks. That couldn\u2019t be further from the truth. Yes, typically it is the big names that make the headlines, but increasingly smaller organisations are also targeted as threat actors realise that they are part of the supply chain and often open the door \u2013 given the interconnected working practices \u2013 to larger companies.&nbsp;<\/p>\n\n\n\n<p>Ten years ago a ransomware attack was really obvious. The computer was bricked with a ransomware demand displayed on the screen. Today, attacks are less obvious and can go undetected for a few weeks as threat actors look to obfuscate their presence allowing them to creep around infrastructure for nefarious purposes.<\/p>\n\n\n\n<p>Ransomware gangs will employ double extortion methods, that takes both the encryption tactic and adds another sinister element: before those files are encrypted, ransomware groups will steal them and threaten to publish them on the dark web if a ransom is not paid. The added pressure from this type of extortion is what has helped make ransomware so successful.<\/p>\n\n\n\n<p>Organisations need to understand the global context around us \u2014 the combination of pressured economy, activism, and geopolitical tensions \u2014 to understand the threat landscape. Focusing only on the pure \u2018technological\u2019 part is not enough to reduce the risk.<\/p>\n\n\n\n<p>Key to risk reduction is a proactive, preventive approach. Getting visibility into where your biggest areas of risk are, we call this exposure management, is absolutely critical to knowing which doors and windows are wide open and need to be closed first. Threat actors are moving quickly and trying to detect and react to their movement is not efficient today.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cybersecuritycloudexpo.com\/europe\/\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01.png\" alt=\"\" class=\"wp-image-100609 lazyload\"\/><noscript><img decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01.png\" alt=\"\" class=\"wp-image-100609 lazyload\" srcset=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01.png 728w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01-300x37.png 300w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01-380x47.png 380w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01-350x43.png 350w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01-100x12.png 100w, https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/06\/cyber-expo-world-728-x-90-01-60x7.png 60w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/noscript><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.tenable.com\/\"><strong>Tenable<\/strong><\/a><strong> will be sharing more of their expertise at this year\u2019s <\/strong><a href=\"https:\/\/cybersecuritycloudexpo.com\/europe\/\"><strong>Cyber Security &amp; Cloud Expo Europe<\/strong><\/a><strong>.<\/strong> Swing by Tenable\u2019s booth at stand #144 to hear more about keeping your business secure.<\/p>\n\n\n\n<p>Explore other upcoming enterprise technology events and webinars powered by TechForge <a href=\"https:\/\/techforge.pub\/events\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As organisations worldwide continue to grapple with an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial. Ahead of Cyber Security &amp; Cloud Expo Europe, Bernard Montel, EMEA Technical Director and Security Strategist at Tenable, shed light on the shifts in cybersecurity over the past five years and offers valuable insights [&hellip;]<\/p>\n","protected":false},"author":1570,"featured_media":101197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[503,501,496,502,46,1969,8,7,3],"tags":[172,647,202,182,533,185,346,1781,137,232,373,163,167,791],"ppma_author":[889],"class_list":["post-101191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-cloud-expo","category-cloud-computing-digital-transformation","category-cloud-computing-enterprise","category-cloud-computing-future-work","category-cloud-computing-hybrid-cloud","category-interviews","category-cloud-computing-private-cloud","category-cloud-computing-public-cloud","category-cloud-computing-security","tag-ai","tag-artificial-intelligence","tag-azure","tag-cloud","tag-cyber-security","tag-cybersecurity","tag-enterprise","tag-generative-ai","tag-hybrid-cloud","tag-microsoft","tag-private-cloud","tag-public-cloud","tag-security","tag-trends"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bernard Montel, Tenable: Navigating the latest cybersecurity trends<\/title>\n<meta name=\"description\" content=\"Amid an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bernard Montel, Tenable: Navigating the latest cybersecurity trends\" \/>\n<meta property=\"og:description\" content=\"Amid an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-17T09:34:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T07:57:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2113\" \/>\n\t<meta property=\"og:image:height\" content=\"1628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ryan Daws\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Gadget_Ry\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Daws\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\"},\"author\":{\"name\":\"Ryan Daws\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/5b9ff1310f48c8f0a57d748d28808d11\"},\"headline\":\"Bernard Montel, Tenable: Navigating the latest cybersecurity trends\",\"datePublished\":\"2024-09-17T09:34:03+00:00\",\"dateModified\":\"2025-04-23T07:57:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\"},\"wordCount\":1090,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg\",\"keywords\":[\"AI\",\"artificial intelligence\",\"azure\",\"cloud\",\"cyber security\",\"cybersecurity\",\"enterprise\",\"generative AI\",\"Hybrid Cloud\",\"microsoft\",\"private cloud\",\"Public Cloud\",\"Security\",\"trends\"],\"articleSection\":[\"Cyber Security &amp; Cloud Expo\",\"Digital Transformation\",\"Enterprise\",\"Future Work\",\"Hybrid Cloud\",\"Interviews\",\"Private Cloud\",\"Public Cloud\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\",\"name\":\"Bernard Montel, Tenable: Navigating the latest cybersecurity trends\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg\",\"datePublished\":\"2024-09-17T09:34:03+00:00\",\"dateModified\":\"2025-04-23T07:57:10+00:00\",\"description\":\"Amid an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg\",\"width\":2113,\"height\":1628,\"caption\":\"Compass illustrating the navigation of the latest cybersecurity trends, including the impact of generative AI.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bernard Montel, Tenable: Navigating the latest cybersecurity trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/5b9ff1310f48c8f0a57d748d28808d11\",\"name\":\"Ryan Daws\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/6595e4680966ed61f0c4ca8bd817a57b\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82963cecdd93f33733ed383f2d8005d91790f3740b49a926d4c180557eec721?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82963cecdd93f33733ed383f2d8005d91790f3740b49a926d4c180557eec721?s=96&d=mm&r=g\",\"caption\":\"Ryan Daws\"},\"description\":\"Ryan Daws is a senior editor at TechForge Media with over a decade of experience in crafting compelling narratives and making complex topics accessible. His articles and interviews with industry leaders have earned him recognition as a key influencer by organisations like Onalytica. Under his leadership, publications have been praised by analyst firms such as Forrester for their excellence and performance. Connect with him on X (@gadget_ry) or Mastodon (@gadgetry@techhub.social)\",\"sameAs\":[\"https:\/\/twitter.com\/gadget_ry\",\"https:\/\/x.com\/Gadget_Ry\"],\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/ryan\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Bernard Montel, Tenable: Navigating the latest cybersecurity trends","description":"Amid an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/","og_locale":"en_GB","og_type":"article","og_title":"Bernard Montel, Tenable: Navigating the latest cybersecurity trends","og_description":"Amid an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2024-09-17T09:34:03+00:00","article_modified_time":"2025-04-23T07:57:10+00:00","og_image":[{"width":2113,"height":1628,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg","type":"image\/jpeg"}],"author":"Ryan Daws","twitter_card":"summary_large_image","twitter_creator":"@Gadget_Ry","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"Ryan Daws","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/"},"author":{"name":"Ryan Daws","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/5b9ff1310f48c8f0a57d748d28808d11"},"headline":"Bernard Montel, Tenable: Navigating the latest cybersecurity trends","datePublished":"2024-09-17T09:34:03+00:00","dateModified":"2025-04-23T07:57:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/"},"wordCount":1090,"commentCount":0,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg","keywords":["AI","artificial intelligence","azure","cloud","cyber security","cybersecurity","enterprise","generative AI","Hybrid Cloud","microsoft","private cloud","Public Cloud","Security","trends"],"articleSection":["Cyber Security &amp; Cloud Expo","Digital Transformation","Enterprise","Future Work","Hybrid Cloud","Interviews","Private Cloud","Public Cloud","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/","name":"Bernard Montel, Tenable: Navigating the latest cybersecurity trends","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg","datePublished":"2024-09-17T09:34:03+00:00","dateModified":"2025-04-23T07:57:10+00:00","description":"Amid an ever-expanding threat landscape, understanding the latest cybersecurity trends has never been more crucial.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/09\/bernard-montel-tenable-latest-cybersecurity-trends-cyber-security-insights-generative-ai-artificial-intelligence-public-hybrid-private-cloud.jpg","width":2113,"height":1628,"caption":"Compass illustrating the navigation of the latest cybersecurity trends, including the impact of generative AI."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/bernard-montel-tenable-navigating-latest-cybersecurity-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Bernard Montel, Tenable: Navigating the latest cybersecurity trends"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/5b9ff1310f48c8f0a57d748d28808d11","name":"Ryan Daws","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/6595e4680966ed61f0c4ca8bd817a57b","url":"https:\/\/secure.gravatar.com\/avatar\/d82963cecdd93f33733ed383f2d8005d91790f3740b49a926d4c180557eec721?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82963cecdd93f33733ed383f2d8005d91790f3740b49a926d4c180557eec721?s=96&d=mm&r=g","caption":"Ryan Daws"},"description":"Ryan Daws is a senior editor at TechForge Media with over a decade of experience in crafting compelling narratives and making complex topics accessible. His articles and interviews with industry leaders have earned him recognition as a key influencer by organisations like Onalytica. Under his leadership, publications have been praised by analyst firms such as Forrester for their excellence and performance. Connect with him on X (@gadget_ry) or Mastodon (@gadgetry@techhub.social)","sameAs":["https:\/\/twitter.com\/gadget_ry","https:\/\/x.com\/Gadget_Ry"],"url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/ryan\/"}]}},"authors":[{"term_id":889,"user_id":1570,"is_guest":0,"slug":"ryan","display_name":"Ryan Daws","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/d82963cecdd93f33733ed383f2d8005d91790f3740b49a926d4c180557eec721?s=96&d=mm&r=g","author_category":"","user_url":"https:\/\/twitter.com\/gadget_ry","last_name":"Daws","first_name":"Ryan","job_title":"Senior Editor","description":"Ryan is a senior editor at TechForge Media with over a decade of experience covering the latest technology and interviewing leading industry figures. He can often be sighted at tech conferences with a strong coffee in one hand and a laptop in the other. If it's geeky, he\u2019s probably into it. Find him on Twitter (@Gadget_Ry) or Mastodon (@gadgetry@techhub.social)"}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/101191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/1570"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=101191"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/101191\/revisions"}],"predecessor-version":[{"id":105760,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/101191\/revisions\/105760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/101197"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=101191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=101191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=101191"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=101191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}