Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

May 9, 2023

Cuidado con la brecha:Una vistazo más de cerca a las vulnerabilidades divulgadas en 2022

This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable…


May 9, 2023

Cuidado con la brecha:Un vistazo más de cerca a las CVE más importantes de 2022

This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss…


May 8, 2023

Tenable Cyber Watch: Casi el 50 % de los trabajadores han accedido a las cuentas de ex-empleadores, Biden busca su opinión sobre la responsabilidad en la IA y más

This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have…


May 5, 2023

Instantánea de ciberseguridad: CSA ofrece orientación sobre cómo usar ChatGPT de forma segura en su organización

Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. ¡Y mucho más!


May 4, 2023

Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad

Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions.


May 3, 2023

Presentación de Tenable Cloud Security Agentless Assessment for Microsoft Azure

Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.


May 2, 2023

Protección de las agencias gubernamentales locales con un abordaje de ciberseguridad Whole-of-State (que abarca todo el Estado)

Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…


May 1, 2023

Tenable Cyber Watch: Tres puntos importantes de la conferencia RSA, empleados de Samsung filtran datos confidenciales a ChatGPT y más

This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry.


April 28, 2023

Instantánea de ciberseguridad: Edición especial de la conferencia RSA con bufet libre y ChatGPT

Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!


April 26, 2023

IDC posiciona a Tenable como n.° 1 en participación en el mercado mundial de gestión de vulnerabilidades de dispositivos por cuarto año consecutivo

El último informe de la firma de investigación también proporciona información de mercado que los profesionales de la seguridad pueden utilizar para mejorar su estrategia de gestión de vulnerabilidades.


25 de abril de 2023

Cómo mejorar la seguridad de Kubernetes: cuatro mejores prácticas para implementar hoy mismo

How to ensure the right configurations and policies are in place to keep your cloud environments secure.


25 de abril de 2023

Lo que los líderes de seguridad deben saber sobre el fin de la vida útil de la seguridad: cómo lidera el camino Tenable

Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Póngase en contacto con nuestro equipo de ventas