Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

April 11, 2025

Instantánea de ciberseguridad: Beware of Mobile Spyware Attacks, Cyber Agencies Warn, While Corporate Boards Get Cyber Governance Guidance

Check out why a global geopolitical spyware campaign could ensnare mobile users outside of its target groups. Plus, the U.K.’s cyber agency offers cyber governance resources to boards of directors. Also, find out what webinar attendees told Tenable about using port scanning and service discovery to ...


April 10, 2025

Frequently Asked Questions About Model Context Protocol (MCP) and Integrating with AI for Agentic Applications

The emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some security concerns. In this blog we address FAQs about MC...


April 9, 2025

Seguridad en la nube más robusta en cinco minutos: la importancia de la seguridad de la configuración en la nube

Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management....


April 8, 2025

El Martes de parches de Microsoft de abril de 2025 aborda 121 CVE (CVE-2025-29824)

Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild....


April 8, 2025

Cómo implementar acceso justo a tiempo: mejores prácticas y lecciones aprendidas

With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, we’ll share how we implemented JIT access internally at Tenable using...


April 7, 2025

Cinco pasos para trasladarse hacia la gestión de exposición

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we explore the five steps to take on your journey to exposure management....


April 4, 2025

Instantánea de ciberseguridad: SANS Recommends Six Controls To Secure AI Systems, While NCSC Warns About Outdated API Security Methods

Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security practices. In addition, CISA and other cyber agencies warn that attackers are using “fast flux” techniques to conceal their actio...


April 3, 2025

Cómo endurecer los permisos de GitLab con Tenable

If your organization uses GitLab for managing your software development lifecycle, you must ensure you’re not misconfiguring the permissions of this open source DevSecOps platform. Doing so can expose your source code, along with sensitive data, while creating security risks. In this blog, we’ll exp...


April 1, 2025

ImageRunner: una vulnerabilidad de escalación de privilegios que afecta a GCP Cloud Run

Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions but that have edit permissions on Google Cloud Run revisions. The vulnerability could have allowed...


March 31, 2025

Los líderes de ciberseguridad comparten tres desafíos que la gestión de exposición les ayuda a resolver

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this blog, we share three challenges cybersecurity leaders say exposure management helps them solve....


March 28, 2025

Instantánea de ciberseguridad: NIST Details Attacks Against AI, Recommends Defenses, While ETSI Issues Quantum-Resistant Crypto Standard

Check out NIST’s comprehensive taxonomy of cyberattacks against AI systems, along with mitigation recommendations. Plus, organizations have another cryptographic algorithm for protecting data against future quantum attacks. And get the latest on the IngressNightmare vulnerabilities, and on cyber ris...


March 26, 2025

¿Quién teme a los riesgos de IA en los entornos en la nube?

The Tenable Cloud AI Risk Report 2025 reveals that 70% of AI cloud workloads have at least one unremediated critical vulnerability — and that AI developer services are plagued by risky permissions defaults. Find out what to know as your organization ramps up its AI game....


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

La falla en Apache Log4j coloca al software de terceros bajo los reflectores

Ver los detalles >