Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

February 14, 2023

El Martes de parches de febrero de 2023 de Microsoft aborda 75 CVE (CVE-2023-23376)

Microsoft addresses 75 CVEs including three zero-day vulnerabilities that were exploited in the wild.


February 14, 2023

Navegar por las recomendaciones federales de ciberseguridad para los servicios públicos de agua: cómo puede ayudar Tenable

Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and…


February 13, 2023

Cyber Watch: Un vistazo al marco de riesgos de IA del NIST, protección de los empleados contra estafas, cómo hablar con sus contrapartes de negocios y más

Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for protecting your employees from money-transfer scams.  Learning to secure AI? Curious to know how…


February 10, 2023

Instantánea de ciberseguridad: Echa un vistazo a nuestra entrevista sin restricciones con ChatGPT

We pulled no punches in our question-and-answer session with ChatGPT: Find out what the world’s most famous AI chatbot had to say. Plus, CISA and the FBI offer help in dealing with a massive ransomware campaign. Also, are CIOs becoming de-facto CISOs? And cyber attackers are aiming at finance and…


February 8, 2023

How to Implement CIEM – A Checklist

What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out.


February 8, 2023

Cómo extraer datos y valor de la solución EASM de Tenable

It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data.


February 6, 2023

Tenable Cyber Watch: Los proveedores de IoT carecen de divulgaciones de vulnerabilidades, la cibernética se clasifica como la principal preocupación de negocios nuevamente, las frustraciones de la GAO con las agencias federales que no prestan atención a sus consejos de ciberseguridad

This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the GAO's frustrations with federal agencies not heeding their cybersecurity advice and provides…


February 3, 2023

Instantánea de ciberseguridad: A medida que ChatGPT Fire se intensifica, NIST emite una guía de seguridad en relación a la IA

Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!


February 1, 2023

El tiempo es ahora para los EE. UU. El gobierno ayudará a impulsar la ciberseguridad en África

African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. 


February 1, 2023

How Attackers Can Exploit GCP’s Multicloud Workload Solution

A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations.


January 31, 2023

ProxyNotShell, OWASSRF, TabShell: Coloque parches en sus Microsoft Exchange Servers Now

Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended.


January 30, 2023

Tenable Cyber Watch: Qué piensan los CISO acerca de sus trabajos, por qué los desarrolladores luchan con la seguridad, uso de IA para reducir el riesgo

This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back.  Ever wonder how happy your CISO is at…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Póngase en contacto con nuestro equipo de ventas