Tenable Cyber Watch: Tres puntos importantes de la conferencia RSA, empleados de Samsung filtran datos confidenciales a ChatGPT y más
This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry. ...
Instantánea de ciberseguridad: Edición especial de la conferencia RSA con bufet libre y ChatGPT
Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!...
IDC posiciona a Tenable como n.° 1 en participación en el mercado mundial de gestión de vulnerabilidades de dispositivos por cuarto año consecutivo
The research firm's latest report also provides market insights security professionals can use to improve their vulnerability management strategy....
Cómo mejorar la seguridad de Kubernetes: cuatro mejores prácticas para implementar hoy mismo
How to ensure the right configurations and policies are in place to keep your cloud environments secure....
Lo que los líderes de seguridad deben saber sobre el fin de la vida útil de la seguridad: cómo lidera el camino Tenable
Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers....
‘K’ de ‘Komplejo’: consideraciones clave de Kubernetes para los equipos de seguridad
The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s w...
Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume
How to do CWP right to prepare your organization and protect it from the next widespread vulnerability. ...
Tenable Cyber Watch: El mercado Genesis de la Dark Web fue cerrado, cómo Usar ChatGPT puede infringir las reglas de privacidad de datos y más
This week’s edition of the Tenable Cyber Watch unpacks the international sting operation that successfully shut down notorious cybercrime marketplace Genesis Market and explores how using ChatGPT can breach data privacy rules. Also covered: Why the cybersecurity term “BISO” is getting all the buzz. ...
ETHOS: reuniendo a la comunidad de seguridad de OT para compartir información sobre amenazas
Tenable participates in a first-of-its-kind initiative that will aggregate information from several operational technology (OT) security vendors to share emerging threat intelligence with critical infrastructure service providers....
CVE-2023-20864: VMware Aria Operations para vulnerabilidad de deserialización de registros
VMware issues advisory to address two flaws in its VMware Aria Operations for Logs solution, including a critical deserialization flaw assigned a CVSSv3 score of 9.8....
Instantánea de ciberseguridad: Lo último en seguridad de la cadena de suministro: distribución SBOM, fallas en código abierto y un nuevo marco de seguridad
Check out what CISA says about the sharing of software bills of materials. Plus, why you should tread carefully with open source components. Also, the SLSA supply chain security framework is ready. In addition, security worries hold back enterprise IoT adoption. And much more!...
Actualización de parche crítica de abril de 2023 de Oracle aborda 231 CVE
Oracle addresses 231 CVEs in its second quarterly update of 2023 with 433 patches, including 74 critical updates....