El papel del código abierto en la seguridad en la nube: un caso de estudio, Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...
El Martes de parches de Microsoft de mayo de 2023 aborda 38 CVE (CVE-2023-29336)
Microsoft addresses 38 CVEs including three zero-day vulnerabilities, two of which were exploited in the wild....
La integración de Tenable Security Center en Tenable One proporciona gestión de exposición completa para los clientes con implementaciones locales
Con la integración de Tenable Security Center en Tenable One, Tenable se convierte en el único proveedor que ofrece gestión de exposición para modelos de implementación tanto local como híbrida. Here’s what you need to know. ...
Cuidado con la brecha: Cómo la espera de NVD coloca a su organización en riesgo
This is the first of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. We explore the impact of that gap on an organization’s cyber risk and discuss how Tenable can help....
Cuidado con la brecha: Cómo los marcos de vulnerabilidades existentes pueden dejar a una organización expuesta
This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and dis...
Cuidado con la brecha:Una vistazo más de cerca a las vulnerabilidades divulgadas en 2022
This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable ca...
Cuidado con la brecha:Un vistazo más de cerca a las CVE más importantes de 2022
This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss how...
Tenable Cyber Watch: Casi el 50 % de los trabajadores han accedido a las cuentas de ex-empleadores, Biden busca su opinión sobre la responsabilidad en la IA y más
This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have ...
Instantánea de ciberseguridad: CSA ofrece orientación sobre cómo usar ChatGPT de forma segura en su organización
Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. And much more! ...
Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad
Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions....
Presentación de Tenable Cloud Security Agentless Assessment for Microsoft Azure
Los usuarios de Tenable Cloud Security ahora pueden conectar rápidamente sus cuentas de Azure Cloud para realizar la gestión de la postura de seguridad en la nube, incluyendo el escaneo para vulnerabilidades de seguridad, errores de configuración y conformidad.Here’s how....
Protección de las agencias gubernamentales locales con un abordaje de ciberseguridad Whole-of-State (que abarca todo el Estado)
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...