CNAPPgoat: The Multicloud Open-Source Tool for Deploying Vulnerable-by-Design Cloud Resources
Here’s all you need to know about CNAPPgoat, our open-source project designed to modularly provision vulnerable-by-design components in cloud environments....
Uso del protocolo de ubicación de servicios (SLP) para buscar interfaces de gestión expuestas
Exposed management interfaces are valuable entry points for attackers. La Directiva Operativa Vinculante de CISA 23-02 pide que se saquen de Internet.Here’s a novel approach for finding some of these elusive devices using SLP....
Desempaquetando el modelo de responsabilidad compartida para la seguridad en la nube: cómo evitar brechas en la cobertura y confusión
Confusion over the scope of customer responsibility for cloud security causes control gaps and exposes businesses to risks of attack and non-compliance. Secure configuration of customer-managed resources is the most critical factor for reducing cloud risk. However, it can only be achieved by first u...
Las novedades en Tenable OT Security 3.16: Elevación de la seguridad del sistema de gestión de edificios y la experiencia del usuario
Tenable OT Security 3.16 introduces advanced security for building automation systems, a streamlined interface and simplified upgrade process, empowering users to be at the forefront of securing their IT, OT, BMS and IoT assets with confidence....
Tenable Cyber Watch: El gobierno de los EE. UU. Gobierno lanza el plan de implementación de ciberseguridad, la CISA comparte herramientas gratuitas para la seguridad en la nube y más
This week’s edition of Tenable Cyber Watch unpacks the White House’s National Cybersecurity Strategy Implementation Plan and offers new tips and guidance for C-level executives regarding generative AI adoption. Also covered: CISA shares its factsheet offering free tools to help secure cloud environm...
Preguntas frecuentes: qué implican las nuevas normas de ciberseguridad de la SEC para los líderes de Infosec
On July 26, the SEC voted 3-2 to adopt new rules which would require several new cybersecurity disclosures from publicly traded companies. Here’s what cybersecurity leaders need to know....
Instantánea de ciberseguridad: La SEC desea más transparencia en la ciberseguridad de las entidades públicas
Find out what’s in the SEC’s new cybersecurity disclosure rules. Además, la CISA analiza los riesgos cibernéticos que afectan a las organizaciones de infraestructura crítica. También, consulte la orientación para la TI oculta y consejos para impulsar su programa de conocimiento sobre seguridad.And much more!...
La captura de la bandera de Tenable en 2023: ¿está listo para probar sus habilidades de hackeo?
Tenable is bringing its annual hacking competition to Black Hat 2023 in a hybrid in-person and online experience, giving competitors around the world a chance to have fun and test their skills....
Cómo obtener el seguro de ciberseguridad adecuado para su negocio
Cyber insurance has become a necessity, and the cost and effort to obtain it can be considerable. Still, your organization can boost its odds of landing the coverage it needs at a fair price that’s consistent with its risk profile. Check out the invaluable advice from a panel of experts from the ins...
CVE-2023-35078: Vulnerabilidad de acceso API no autenticada de Ivanti Endpoint Manager Mobile (EPMM) / MobileIron Core
Critical vulnerability in a popular mobile device management solution from Ivanti has been exploited in the wild in limited attacks...
La IA tiene que ver con conquistar la ciberseguridad: esto es lo que usted puede esperar
Generative AI will elevate the practice of successful preventive cybersecurity, but how will it manifest itself across cybersecurity products? Here are a few game-changers to look for....
Tenable Cyber Watch: El gobierno de los EE. UU. El Gobierno describe las prioridades de inversión en ciberseguridad, un estudio muestra que los equipos cibernéticos tienen demasiada confianza y más
This week’s edition of Tenable Cyber Watch unpacks CISA and the NSA’s CI/CD defense guidance and explores the White House’s cybersecurity investment priorities. Also covered: why one study says cyber teams are too confident. ...