Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

September 22, 2022

$1 Billion State and Local Cybersecurity Grant Program Now Open for Applicants

As threats continue to evolve, state and local governments benefit from federal grant funding to bolster their cybersecurity posture.


September 20, 2022

Por fin encontrará las 'incógnitas desconocidas' a lo largo de toda su superficie de ataque

Los CISO temen a las “incógnitas desconocidas”: los activos, las vulnerabilidades, las configuraciones erróneas y las debilidades del sistema que el equipo de seguridad no ha detectado y, por lo tanto, no ha neutralizado. Estos puntos ciegos representan una oportunidad de oro para los atacantes y un riesgo de seguridad importante para las organizaciones.


September 16, 2022

Instantánea de ciberseguridad: Seis cosas que importan ahora

Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity | Guides to help developers beef up on security | And much more!


September 15, 2022

AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks

Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks.


September 14, 2022

CVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the Wild

Trend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been exploited in the wild.


September 14, 2022

IDSA Introduces CIEM Best Practices

The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management.


September 13, 2022

Microsoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)

Microsoft addresses 62 CVEs in its September 2022 Patch Tuesday release, including five critical flaws.


September 13, 2022

Ajuste de evaluaciones de red para rendimiento y uso de recursos

Using the correct tool for the job and optimizing scanner placement will have a large impact on scan efficiency with Nessus, Tenable.io and Tenable.sc.


September 9, 2022

Instantánea de ciberseguridad: Seis cosas que importan ahora

Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security tools. Increasing diversity in cybersecurity. Another look at the major cloud security threats. And much more!


September 8, 2022

IT/OT Convergence: Now Is the Time to Act

Presidential advisory committee provides recommendations to improve critical infrastructure security.


September 7, 2022

96% Could Have Prevented Their Identity Breach – IDSA

Identity-related breaches are on the rise but security and IAM pros are not idle. Learn from this survey how they are staving off the next attack.


September 7, 2022

La visibilidad completa de TI necesita el contexto del riesgo para el negocio

Contar con una comprensión completa, detallada y continuamente actualizada de todos los activos de TI es uno de los santos griales de los equipos de seguridad. Para lograrlo, primero debemos comprender en qué consiste realmente la "visibilidad", la cual implica mucho más que identificar qué activos hay y saber qué desafíos deben abordarse.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >

× Contact our sales team