Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

April 7, 2023

Instantánea de ciberseguridad: El uso de ChatGPT puede llegar a provocar violaciones a la privacidad de datos

Learn how businesses can run afoul of privacy laws with generative AI chatbots like ChatGPT. Plus, the job market for cyber analysts and engineers looks robust. Also, cybercrooks lost a major resource with the Genesis Market shutdown. In addition, the six common mistakes cyber teams make. And much…


April 3, 2023

Terraform Lab: Taking the New VPC Endpoint Condition Keys Out for a Spin

Our new open source Terraform project offers hands-on experience with VPC endpoints and demos AWS's new condition keys for securing EC2 instances


April 3, 2023

Tenable Cyber Watch: Ayuda para el mapeo de MITRE ATT&CK, por qué las organizaciones luchan con la protección de datos SaaS y más

This week’s edition of the Tenable Cyber Watch unpacks CISA’s new ‘Decider” tool, which aims to streamline MITRE ATT&CK mapping. We also explore why organizations struggle with data protection of software as a service apps. Also covered: Why cyber pros think cloud creates opportunities for cyber…


March 31, 2023

Instantánea de ciberseguridad: La CISA lanza una herramienta de respuesta a incidentes para Microsoft Cloud Services

Learn about a free tool for detecting malicious activity in Microsoft cloud environments. Plus, Europol warns about ChatGPT cyber risks. Also, how business email compromise (BEC) scammers are stealing merchandise. In addition, CISA alerts orgs about early-stage ransomware breaches. And much more! 


March 30, 2023

Se reporta que la aplicación 3CX Desktop para Windows y macOS ha sido puesta en riesgo en ataque contra cadena de suministro

A softphone desktop application from 3CX, makers of a popular VoIP PBX solution used by over 600,000 organizations, has reportedly been trojanized as part of a supply chain attack


March 29, 2023

Cinco principios fundamentales para la seguridad de la nube híbrida 

Cómo crear una estrategia de seguridad para la nube híbrida que sea efectiva, escalable y accesible.


March 28, 2023

Gestión de exposición: 7 beneficios de un abordaje de plataforma

When it comes to preventive cybersecurity, there have been longstanding debates over whether it's more effective to operate an array of best-of-breed point solutions or to take a more consolidated platform approach. Here are seven reasons an exposure management platform can help reduce cyber risk.


March 27, 2023

La EPA emite regulaciones de ciberseguridad para sistemas públicos de agua: cómo puede ayudar Tenable

EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help.


March 27, 2023

Tenable Cyber Watch: Agencia cibernética del Reino Unido expresa preocupación por ChatGPT, el programa CISA enfrenta el ransomware en infraestructura crítica y más

This week’s edition of the Tenable Cyber Watch unpacks CISA’s new pilot program that detects vulnerabilities in critical infrastructure and addresses the FBI’s plea for more ransomware victims to report attacks. Also covered: Why the U.K. National Cyber Security Centre is warning ChatGPT users to…


March 27, 2023

Federating Kubernetes Workloads with Cloud Identities

Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely.


March 24, 2023

Instantánea de ciberseguridad: Refuerce la seguridad de la gestión de acceso e identidades con las nuevas prácticas recomendadas de CISA/NSA

Learn about a new guide packed with best practices recommendations to improve IAM systems security. Plus, cybersecurity ranks as top criteria for software buyers. Also, guess who’s also worried about ChatGPT? Oh, and do you know what a BISO is? And much more! 


March 22, 2023

Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important

Segregation in cloud environments is important for security — this post explores why and offers best practice tips for acting on it.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Contact our sales team