Developer Offer
Try ImaginePro API with 50 Free Credits
Build and ship AI-powered visuals with Midjourney, Flux, and more â free credits refresh every month.
Cybersecurity Frontiers NIST OpenAI And More
Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about their exposure management experiences. And get the latest on cyber crime trends, a new cybersecurity executive order and more!
Dive into six things that are top of mind for the week ending June 13.
NIST Guides Zero Trust Implementation
Zero trust architectures (ZTAs) are gaining traction as traditional on-premise security perimeters become obsolete due to cloud services, mobile devices, remote work, and IoT. However, ZTA implementations need to be tailored to specific environments, as they are not a one-size-fits-all solution.
To assist organizations in planning and deploying ZTAs, the U.S. National Institute of Standards and Technology (NIST) recently published a guide titled âImplementing a Zero Trust Architecture: Full Document (SP 1800-35).â
This new guide offers 19 concrete ZTA implementation examples, complementing NISTâs earlier âZero Trust Architecture (SP 800-207),â which defines ZTA, its components, benefits, and risks.
Alper Kerman, a NIST computer scientist and the guideâs author, stated, âThis guidance gives you examples of how to deploy ZTAs and emphasizes the different technologies you need to implement them. It can be a foundational starting point for any organization constructing its own ZTA.â

NIST collaborated with 24 technology partners, including Tenable, to develop the guide. James Hayes, Tenable Senior VP of Global Government Affairs, remarked in a LinkedIn post, âOur role? Help ensure that every device, user, and system is verified, monitored, and protected. This is what public-private partnership looks like at its best.â
Beyond the examples, the guide outlines core steps for all ZTA implementations:
- Discovering and inventorying all IT assets (hardware, software, applications, data, services).
- Specifying security policies for resource access based on least privilege principles.
- Identifying and inventorying existing security tools and determining their role in the ZTA.
- Designing access topology based on risk and data value.
- Rolling out ZTA components (people, processes, technologies) and deploying baseline security for areas like continuous monitoring, identity management, vulnerability scanning, and endpoint protection.
- Verifying implementation by continuously monitoring traffic, auditing access decisions, validating policy enforcement, and performing scenario-based testing.
- Continuously improving the ZTA based on evolving goals, threats, technology, and requirements.
For more details, explore:
- The âImplementing a Zero Trust Architecture: Full Document (SP 1800-35)â guide
- The complementary âImplementing a Zero Trust Architecture: High-Level Document (SP 1800-35)â
- The companion fact sheet
- The ZTA homepage of NISTâs National Cybersecurity Center of Excellence
- The statement âNIST Offers 19 Ways to Build Zero Trust Architecturesâ
Further Tenable resources on zero trust include:
- âRethink security with a zero-trust approachâ (solutions page)
- âWhat is zero trust?â (cybersecurity guide)
- â5 Things Government Agencies Need to Know About Zero Trustâ (blog)
- âMaking Zero Trust Architecture Achievableâ (blog)
- âSecurity Beyond the Perimeter: Accelerate Your Journey to Zero Trustâ (on-demand webinar)
OpenAI Tackles Malicious AI Use
OpenAI has recently detected and stopped various malicious uses of its AI tools, including cyber espionage, social engineering, fraudulent employment schemes, covert operations, and scams.
The company stated in its report, âDisrupting malicious uses of AI: June 2025,â published this week, âEvery operation we disrupt gives us a better understanding of how threat actors are trying to abuse our models, and enables us to refine our defenses.â
OpenAI detailed 10 incidents, sharing how they were flagged and defused to benefit other AI defenders.

Here are three examples from the report:
- North Korea-based cyber scammers used ChatGPT to automate fraudulent activities like creating false resumes and recruiting North American residents for scams.
- China-based fraudsters abused ChatGPT to mass-produce social media posts for misinformation campaigns on geopolitical issues, primarily on TikTok, X, Facebook, and Reddit.
- Russian-speaking malicious actors used ChatGPT accounts to develop a multi-stage malware campaign, including setting up command-and-control infrastructure for credential theft, privilege escalation, and attack obfuscation.
âWeâll continue to share our findings to enable stronger defenses across the internet,â the report concludes.
For more on AI security, see these Tenable resources:
- âHow to Discover, Analyze and Respond to Threats Faster with Generative AIâ (blog)
- âSecuring the AI Attack Surface: Separating the Unknown from the Well Understoodâ (blog)
- âHarden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resourcesâ (blog)
- âTenable Cloud AI Risk Report 2025â (report)
- âTenable Cloud AI Risk Report 2025: Helping You Build More Secure AI Models in the Cloudâ (on-demand webinar)
Tenable Webinar Insights on Exposure Management
During our recent webinar, âSecurity Without Silos: How to Gain Real Risk Insights with Unified Exposure Management,â attendees were polled about their exposure management knowledge, challenges, and concerns.
(44 webinar attendees polled by Tenable. Respondents could choose more than one answer.)
(85 webinar attendees polled by Tenable)
(89 webinar attendees polled by Tenable)
To learn more about unified exposure management, watch this webinar on-demand!
AI Systems Learning To Acknowledge Unknowns
AI systems frequently make mistakes, a significant challenge for developers. A critical solution is building AI systems that can recognize tasks they havenât been trained for and admit they donât know how to proceed.
This insight comes from the article âOut of Distribution Detection: Knowing When AI Doesnât Know,â by Eric Heim and Cole Frank from Carnegie Mellon Universityâs Software Engineering Institute (SEI).
They explore out-of-distribution (OoD) detectionâflagging when an AI system encounters untrained situationsâparticularly for military AI applications.
âBy understanding when AI systems are operating outside their knowledge boundaries, we can build more trustworthy and effective AI capabilities for defense applications â knowing not just what our systems know, but also what they donât know,â they wrote.

The authors outline three OoD detection categories:
- Anomaly detection and density estimation (modeling ânormalâ data).
- Learning with rejection and uncertainty-aware models (detecting OoD instances).
- Adding OoD detection to existing models.
They caution that these methods have pros and cons, arenât foolproof, and should be a âlast line of defense.â Rigorous testing, monitoring for known failures, and comprehensive analysis of operational conditions are also essential.
For more on OoD and AI accuracy:
- âNever Assume That the Accuracy of Artificial Intelligence Information Equals the Truthâ (United Nations University)
- âAccurate and reliable AI: Four key ingredientsâ (Thomson Reuters)
- âWhat do we need to know about accuracy and statistical accuracy?â (U.K. Information Commissionerâs Office)
- âOut-of-Distribution Detection Is Not All You Needâ (UniversitĂŠ de Toulouse, Toulouse, France)
- âRule-Based Out-of-Distribution Detectionâ (IEEE)
White House EO Aims to Modernize Federal Cybersecurity
The Trump administration has emphasized enhancing U.S. federal government cybersecurity with the recent Executive Order (EO) 14306.
A White House fact sheet states EO 14306 aims âto strengthen the nationâs cybersecurity by focusing on critical protections against foreign cyber threats and enhancing secure technology practices.â

The EO covers AI system vulnerabilities, IoT security, quantum computing risks, patch management, secure software development, and critical infrastructure defense.
Tenableâs James Hayes noted in a blog, âThis EO reinforces the importance of shifting from reactive to proactive cybersecurity.â He added, âBy addressing emerging risks â such as AI exploitation, post-quantum threats and software supply chain weaknesses â the administration is signaling the need for adaptability and continuous improvement.â
Learn more about EO 14306 in the blog âNew Cybersecurity Executive Order: What You Need To Know.â
Europol Report Cyber Crooks Exploiting Stolen Data and AI
Cyber criminals are increasingly using AI to ramp up data theft, which forms the basis for numerous cyber attacks like online fraud, ransomware, child exploitation, and extortion. This is a key finding from Europolâs âInternet Organised Crime Threat Assessment 2025â report.
A Europol statement highlighted, âFrom phishing to phone scams, and from malware to AI-generated deepfakes, cybercriminals use a constantly evolving toolkit to compromise systems and steal personal information.â

Initial access brokers (IABs) sell stolen credentials and data on dark web forums. Criminals are also using end-to-end encrypted communication apps for deals.
Regarding AI, especially generative AI, crooks abuse it for sophisticated social engineering attacks. âCriminals now tailor scam messages to victimsâ cultural context and personal details with alarming precision,â the statement reads.
For more on data security, check these Tenable resources:
- âSecuring Financial Data in the Cloud: How Tenable Can Helpâ (blog)
- âCISA and NSA Cloud Security Best Practices: Deep Diveâ (blog)
- âKnow Your Exposure: Is Your Cloud Data Secure in the Age of AI?â (on-demand webinar)
- âHarden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resourcesâ (blog)
- âStronger Cloud Security in Five: How DSPM Helps You Discover, Classify and Secure All Your Data Assetsâ (blog)
Compare Plans & Pricing
Find the plan that matches your workload and unlock full access to ImaginePro.
| Plan | Price | Highlights |
|---|---|---|
| Standard | $8 / month |
|
| Premium | $20 / month |
|
Need custom terms? Talk to us to tailor credits, rate limits, or deployment options.
View All Pricing Details

