Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

July 26, 2024

Instantánea de ciberseguridad: North Korea’s Cyber Spies Hunt for Nuclear Secrets, as Online Criminals Ramp Up AI Use in the EU

Check out a CISA-FBI advisory about North Korean cyber espionage on critical infrastructure orgs. Plus, what Europol found about the use of AI for cybercrime. Meanwhile, the risk concerns that healthcare leaders have about generative AI. And a poll on water plant cybersecurity. And much more!...


July 24, 2024

ConfusedFunction: Una vulnerabilidad de escalación de privilegios que causa impacto en las funciones de la nube de Google Cloud Platform (GCP)

Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs ...


July 23, 2024

Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design

With the unprecedented tech outages experienced by so many of our customers over the last week, we recognize the need for deeper understanding of our software development processes and how they support global business continuity. In this blog post, we’ll outline how Tenable’s comprehensive approach ...


July 23, 2024

Si solo cuenta con cinco minutos, aquí presentamos brevemente CNAPP (pero también tenemos un libro electrónico)

Si está desconcertado por todo este revuelo sobre las plataformas de protección de aplicaciones nativas en la nube (CNAPP), no se preocupe. Our new eBook “Empower Your Cloud: Mastering CNAPP Security” explains in plain English what CNAPP is, how it works and why it’ll help you secure your cloud environment confidently. Read o...


July 22, 2024

Mejora de la seguridad en la nube con acceso JIT para aplicaciones SaaS confidenciales

Using just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege....


July 22, 2024

How To Do a Security Audit of Pimcore Enterprise Platform

Our new research paper gives you a roadmap for using Pimcore's features while preserving security....


July 19, 2024

Actualización para clientes de Tenable en relación al incidente de CrowdStrike

Please read this important customer update about CrowdStrike's recent incident....


July 19, 2024

Instantánea de ciberseguridad: CISA Breaks Into Agency, Outlines Weak Spots in Report, as Cloud Security Alliance Updates Cloud Sec Guidance

CISA’s red team acted like a nation-state attacker in its assessment of a federal agency’s cybersecurity. Plus, the Cloud Security Alliance has given its cloud security guidance a major revamping. Meanwhile, a Google report puts a spotlight on insecure credentials. And the latest on open source secu...


July 18, 2024

Tenable Announces Former Senior Administration Officials to Inaugural Public Sector Advisory Board

Rob Joyce and Mark Weatherford will help Tenable shape federal cyber and AI policy...


July 16, 2024

La actualización de parches críticos de Oracle de julio de 2024 aborda 175 CVE

Oracle addresses 175 CVEs in its third quarterly update of 2024 with 386 patches, including 26 critical updates....


July 12, 2024

Instantánea de ciberseguridad: CISA Tells Tech Vendors To Squash Command Injection Bugs, as OpenSSF Calls on Developers To Boost Security Skills

Check out CISA’s call for weeding out preventable OS command injection vulnerabilities. Plus, the Linux Foundation and OpenSSF spotlight the lack of cybersecurity expertise among SW developers. Meanwhile, GenAI deployments have tech leaders worried about data privacy and data security. And get the l...


July 11, 2024

Cómo la gestión de vulnerabilidades basada en el riesgo impulsa su postura de seguridad para entornos de TI modernos

La evaluación de vulnerabilidades y la gestión de vulnerabilidades suelen confundirse, pero son dos cosas distintas. De acuerdo al documento técnico de Enterprise Strategy Group: "es fundamental comprender sus diferencias y cambiar de evaluaciones de vulnerabilidades ad hoc a una gestión de vulnerabilidades basada en el riesgo (RBVM) continua". Read...


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >