Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

April 24, 2023

‘K’ de ‘Komplejo’: consideraciones clave de Kubernetes para los equipos de seguridad

The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s…


April 24, 2023

Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume

How to do CWP right to prepare your organization and protect it from the next widespread vulnerability.


April 24, 2023

Tenable Cyber Watch: El mercado Genesis de la Dark Web fue cerrado, cómo Usar ChatGPT puede infringir las reglas de privacidad de datos y más

This week’s edition of the Tenable Cyber Watch unpacks the international sting operation that successfully shut down notorious cybercrime marketplace Genesis Market and explores how using ChatGPT can breach data privacy rules. Also covered: Why the cybersecurity term “BISO” is getting all the buzz…


April 24, 2023

ETHOS: reuniendo a la comunidad de seguridad de OT para compartir información sobre amenazas

Tenable participates in a first-of-its-kind initiative that will aggregate information from several operational technology (OT) security vendors to share emerging threat intelligence with critical infrastructure service providers.


April 21, 2023

CVE-2023-20864: VMware Aria Operations para vulnerabilidad de deserialización de registros

VMware issues advisory to address two flaws in its VMware Aria Operations for Logs solution, including a critical deserialization flaw assigned a CVSSv3 score of 9.8.


April 21, 2023

Instantánea de ciberseguridad: Lo último en seguridad de la cadena de suministro: distribución SBOM, fallas en código abierto y un nuevo marco de seguridad

Check out what CISA says about the sharing of software bills of materials. Plus, why you should tread carefully with open source components. Also, the SLSA supply chain security framework is ready. In addition, security worries hold back enterprise IoT adoption. ¡Y mucho más!


April 19, 2023

Actualización de parche crítica de abril de 2023 de Oracle aborda 231 CVE

Oracle addresses 231 CVEs in its second quarterly update of 2023 with 433 patches, including 74 critical updates.


April 19, 2023

Siete Marcos normativos y de cumplimiento con amplias implicaciones para la seguridad en la nube

Security teams responsible for enforcing regulatory and compliance mandates in a scalable and consistent way are often challenged to translate general legislative guidelines and controls into specific policies, tools and processes.


April 17, 2023

Anunciamos los ganadores de los 2023 Tenable Assure Partner Awards

Celebrating the elite defenders who are helping organizations around the world reduce their cyber risk.


April 17, 2023

Tenable Cyber Watch: El FBI advierte de una sofisticada estafa de BEC, NIST revela su nuevo centro de recursos de IA y más

This week’s edition of the Tenable Cyber Watch unpacks the business email compromise scams (BEC) that are targeting vendors and explores NIST’s new AI Resource Center. Also covered: The most in-demand cybersecurity jobs for this year according to COMPTIA’s “State of the Tech Workforce Report” for…


April 14, 2023

Instantánea de ciberseguridad: Las preocupaciones por el ChatGPT se acumulan y el gobierno de los EE. UU. considera regular la IA

As ChatGPT security worries rise, the Biden administration looks at crafting AI policy controls. Plus, Samsung reportedly limits ChatGPT use after employees fed it proprietary data. Also, how password mis-management lets ex-staffers access employer accounts. In addition, the top identity and access…


April 12, 2023

Agentes vs. sin agentes:¿qué solución es la adecuada para su entorno de nube pública?

You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Póngase en contacto con nuestro equipo de ventas