Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

June 9, 2023

Instantánea de ciberseguridad: ¿Genera su propio ChatGPT? Aprenda cómo evitar los riesgos para la seguridad de los modelos de IA

Find out why cyber teams must get hip to AI security ASAP. Plus, check out the top risks of ChatGPT-like LLMs. Also, learn what this year’s Verizon DBIR says about BEC and ransomware. Plus, the latest trends on SaaS security. ¡Y mucho más!


June 6, 2023

Mastering the Art of Kubernetes Security

With Kubernetes’ explosive adoption by the development community comes an urgent need to secure clusters and ensure their compliance effectively.


June 6, 2023

¿Quiere saber más acerca de la gestión de exposición? Vea este informe de Gartner®

At Tenable, we believe that you need exposure management to protect your modern attack surface. But it’s not just us. We feel the Gartner “Predicts 2023: Enterprises Must Expand from Threat to Exposure Management” report is required reading for cybersecurity teams adopting an exposure management…


June 5, 2023

Tenable Cyber Watch: El ‘Volt Typhoon’ chino es usado para atacar a los EE. UU. Infraestructura crítica, los ataques BEC se disparan y más

This week’s edition of the Tenable Cyber Watch unpacks the White House’s updates to its National AI R&D Strategic Plan and addresses the recent surge in business email compromise scams. Also covered: CISA’s warning about Volt Typhoon, the hackers backed by the Chinese government that have been…


June 2, 2023

CVE-2023-34362: MOVEIt Transfer, vulnerabilidad de día cero crítica explotada en la realidad

Discovery of a new zero-day vulnerability in MOVEit Transfer becomes the second zero-day disclosed in a managed file transfer solution in 2023, with reports suggesting that threat actors have stolen data from a number of organizations.


June 2, 2023

Instantánea de ciberseguridad: ¿La IA nos eliminará a todos? ¿Cómo impulsar la seguridad de identidades? ¿Tiene un marco para seguridad en la nube?

Check out a hair-raising warning from AI experts. Plus, find out why securing identities is getting harder than ever – and how to fix it. Also, how a cloud security framework can help you – a lot. In addition, check out nifty SaaS security tips. ¡Y mucho más!


May 29, 2023

Tenable Cyber Watch: CEO de OpenAI testifica ante el congreso; conozca a DarkBERT, nueva IA entrenada en la Dark Web; y más

This week’s edition of the Tenable Cyber Watch unpacks Sam Altman’s testimony before Congress on AI risks and regulations, and addresses the importance of cyberattack victims speaking up after an attack. Also covered: An introduction to DarkBERT, the only AI trained on the Dark Web.


May 26, 2023

Instantánea de ciberseguridad: cómo los líderes cibernéticos empresariales pueden aprovechar al monstruo ChatGPT

Check out a guide written for CISOs by CISOs on how to manage the risks of using generative AI in your organization. Plus, the White House unveils an updated national AI strategy. Also, a warning about a China-backed attacker targeting U.S. critical infrastructure. ¡Y mucho más!


May 25, 2023

Volt Typhoon: las autoridades internacionales de ciberseguridad detallan actividad vinculada a agente malicioso patrocinado por el Estado chino

Several international cybersecurity authorities from the United States, United Kingdom, Australia, Canada and New Zealand issue a joint advisory detailing tactics, techniques and procedures used in recent attacks by a Chinese state-sponsored threat actor.


May 24, 2023

Tenable anuncia soporte para Microsoft Azure Linux: una nueva forma de lograr el desarrollo seguro de contenedores

With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of…


May 23, 2023

Cómo Tenable Identity Exposure le ayuda a adoptar las últimas pautas de Zero Trust de la CISA

Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how.


May 22, 2023

Tenable Cyber Watch: Protección de las computadoras cuánticas contra los ciberataques, gestión de vulnerabilidades de IA y más

This week’s edition of the Tenable Cyber Watch unpacks how to protect quantum computers from cyberattacks and addresses the importance of AI vulnerability management. Also covered: CISA’s draft of its security attestation form for software vendors.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Póngase en contacto con nuestro equipo de ventas