Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

May 26, 2023

Instantánea de ciberseguridad: cómo los líderes cibernéticos empresariales pueden aprovechar al monstruo ChatGPT

Check out a guide written for CISOs by CISOs on how to manage the risks of using generative AI in your organization. Plus, the White House unveils an updated national AI strategy. Also, a warning about a China-backed attacker targeting U.S. critical infrastructure. And much more!...


May 25, 2023

Volt Typhoon: las autoridades internacionales de ciberseguridad detallan actividad vinculada a agente malicioso patrocinado por el Estado chino

Several international cybersecurity authorities from the United States, United Kingdom, Australia, Canada and New Zealand issue a joint advisory detailing tactics, techniques and procedures used in recent attacks by a Chinese state-sponsored threat actor....


May 24, 2023

Tenable anuncia soporte para Microsoft Azure Linux: una nueva forma de lograr el desarrollo seguro de contenedores

With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of Micros...


May 23, 2023

Cómo Tenable Identity Exposure le ayuda a adoptar las últimas pautas de Zero Trust de la CISA

Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how....


May 22, 2023

Tenable Cyber Watch: Protección de las computadoras cuánticas contra los ciberataques, gestión de vulnerabilidades de IA y más

This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors. ...


May 19, 2023

Instantánea de ciberseguridad: Mientras OpenAI Honcho llega a Capitol Hill, las nubes de la tormenta regulatoria se forman sobre el mundo de fantasía de la IA

Check out what OpenAI’s CEO told lawmakers in Congress about regulating AI. Meanwhile, an upcoming EU law could cramp ChatGPT’s style. Also, the public’s nail biting over AI is real. In addition, a new AI chatbot may soon answer your burning questions about the dark web. And much more!...


May 18, 2023

Agencias de los EE.UU. y Australia publican un boletín de ciberseguridad sobre el BianLian Ransomware Group

The FBI, ACSC and CISA have released a joint cybersecurity advisory discussing the BianLian ransomware group....


May 15, 2023

Los cambios en nombres de productos de Tenable y la evolución de la marca Tenable

Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. ...


May 15, 2023

Tenable Cyber Watch: La Casa Blanca da a conocer una inversión de USD 140 millones para la IA responsable, principales 5 malwares en el 1er trimestre de 2023 y más

This week’s edition of the Tenable Cyber Watch unpacks the White House’s $140 million dollar investment into AI research and development and explores the security implications of ChatGPT. Also covered: The top 5 malware strains for Q1 2023. ...


May 12, 2023

Instantánea de ciberseguridad: Cómo aumentar la confianza de los clientes en sus servicios digitales

Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. And much more!...


May 11, 2023

El papel del código abierto en la seguridad en la nube: un caso de estudio, Terrascan by Tenable

Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...


May 9, 2023

El Martes de parches de Microsoft de mayo de 2023 aborda 38 CVE (CVE-2023-29336)

Microsoft addresses 38 CVEs including three zero-day vulnerabilities, two of which were exploited in the wild....


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >