Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

January 26, 2024

Instantánea de ciberseguridad: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Cyber agencies from multiple countries published a joint guide on using artificial intelligence safely. Meanwhile, CERT’s director says AI is the top skill for CISOs to have in 2024. Plus, the UK’s NCSC forecasts how AI will supercharge cyberattacks. And a global survey shows cyber pros weighing…


January 24, 2024

Fortalecimiento de las protecciones cibernéticas en los sistemas de OT DoD

Operational technology plays a major role in many aspects of the U.S. Department of Defense — including in military operations, in the infrastructure on bases and throughout the supply chain. Strengthening the cyber defenses of these systems is imperative. Esto es lo que debe saber. 


January 23, 2024

CVE-2024-0204: Vulnerabilidad de evasión de autenticación de Fortra GoAnywhere MFT

Proof-of-concept exploit details are available for a newly disclosed critical vulnerability in Fortra GoAnywhere Managed File Transfer (MFT), a product historically targeted by ransomware


January 23, 2024

CVE-2023-22527: Vulnerabilidad de inyección explotada en la realidad en Atlassian Confluence Data Center and Server Template

In the wild exploitation has begun for a recently disclosed, critical severity flaw in Atlassian Confluence Data Center and Server


January 22, 2024

Suba de nivel su estrategia de seguridad en la nube

Learn how to better your cloud security program with these ten security resolutions.


January 19, 2024

Instantánea de ciberseguridad: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. Plus, the challenges stressing out CISOs are also opening new doors for them. In addition, the latest on the Androxgh0st malware…


January 19, 2024

Aproveche sus registros internos para mejorar su detección de anomalías y su respuesta ante incidentes

Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks.


January 18, 2024

Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions

The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.


January 17, 2024

La actualización de parche crítico de Oracle para enero de 2024 aborda 191 CVE

Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates.


January 16, 2024

CVE-2023-6548, CVE-2023-6549: vulnerabilidades de día cero explotadas en Citrix NetScaler ADC y NetScaler Gateway

Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws.


January 16, 2024

Más allá del horizonte: Las 5 principales tendencias de seguridad en la nube para observar en 2024

La IA generativa sin duda impulsará las capacidades de ciberseguridad de las organizaciones. Sin embargo, los departamentos de ciberseguridad obtendrán pocos beneficios de la IA generativa sin primero aplicar principios sólidos de seguridad en la nube. In this blog, we explain the top cloud security trends that organizations must track –…


January 12, 2024

Instantánea de ciberseguridad: cómo impulsar la ciberseguridad de los sistemas de IA mientras se minimizan los riesgos

Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Póngase en contacto con nuestro equipo de ventas