Instantánea de ciberseguridad: El gobierno de los EE. UU. Se premiará con millones en el Concurso de herramientas cibernéticas de IA, mientras que NIST renueva el marco de ciberseguridad
Got an idea for a new AI-based cybersecurity product? You could win millions in a new contest. Meanwhile, NIST has drafted a major revision to the CSF 2.0 and wants your opinion about it. Also, there’s a new free tool that flags security flaws in public AI models. Plus, most cloud breaches are…
Presentando ExposureAI en Tenable One: conozca el futuro de la ciberseguridad preventiva
La plataforma de gestión de exposición Tenable One ya está transformando la manera en que las organizaciones aplican la ciberseguridad preventiva. Ahora, con la introducción de ExposureAI, los usuarios pueden liberar todo el potencial de la inteligencia artificial generativa para adelantarse a los atacantes.
Secure Your AWS EC2 Instance Metadata Service (IMDS)
Read this review of IMDS, an important AWS EC2 service component, to understand its two versions and improve your AWS security.
El Martes de parches de Microsoft de agosto de 2023 aborda 73 CVE (CVE-2023-38180)
Microsoft addresses 73 CVEs, including one vulnerability exploited in the wild.
Prácticas recomendadas de gestión y autenticación de contraseñas
Attackers are always looking for new ways to crack passwords and gain access to sensitive information. Keeping passwords secure is a challenging, yet critical task. Read this blog to learn several best practices for password management and authentication so you can keep your environment safe.
Tenable Cyber Watch: SEC emite nuevas reglas de divulgación cibernética, las debilidades de software más peligrosas de MITRE y más
This week’s edition of Tenable Cyber Watch unpacks the new cybersecurity disclosures rules from the U.S. Securities and Exchange Commission and looks at MITRE’s list of the most dangerous software weaknesses. Also covered: Cloud adoption by financial institutions continues to increase. What one…
Instantánea de ciberseguridad: ¿Qué, me preocupo? Las empresas adoptan IA generativa, los riesgos de seguridad se condenan
Seduced by generative AI’s potential, organizations plunge ahead overlooking its pitfalls. Plus, check out a common flaw that puts web app data at risk. Also, why many zero day bugs last year were variants of known vulnerabilities. Moreover, find out the current cost of a data breach – ouch! And…
Evitando el azar en la seguridad: el buen gobierno le ayuda desde el código hasta la nube
What's involved in shifting cloud security responsibilities to the app development team with governance by the security team?
AA23-215A: Principales vulnerabilidades explotadas de forma rutinaria en 2022
A joint Cybersecurity Advisory collaborated on by multiple international agencies highlights the top routinely exploited vulnerabilities of 2022.
CNAPPgoat: The Multicloud Open-Source Tool for Deploying Vulnerable-by-Design Cloud Resources
Here’s all you need to know about CNAPPgoat, our open-source project designed to modularly provision vulnerable-by-design components in cloud environments.
Uso del protocolo de ubicación de servicios (SLP) para buscar interfaces de gestión expuestas
Exposed management interfaces are valuable entry points for attackers. CISA Binding Operational Directive 23-02 calls for getting them off the internet. Here’s a novel approach for finding some of these elusive devices using SLP.
Desempaquetando el modelo de responsabilidad compartida para la seguridad en la nube: cómo evitar brechas en la cobertura y confusión
Confusion over the scope of customer responsibility for cloud security causes control gaps and exposes businesses to risks of attack and non-compliance. Secure configuration of customer-managed resources is the most critical factor for reducing cloud risk. However, it can only be achieved by first…