Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization
As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help....
ConfusedFunction: Una vulnerabilidad de escalación de privilegios que causa impacto en las funciones de la nube de Google Cloud Platform (GCP)
Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs ...
Si solo cuenta con cinco minutos, aquí presentamos brevemente CNAPP (pero también tenemos un libro electrónico)
Si está desconcertado por todo este revuelo sobre las plataformas de protección de aplicaciones nativas en la nube (CNAPP), no se preocupe. Our new eBook “Empower Your Cloud: Mastering CNAPP Security” explains in plain English what CNAPP is, how it works and why it’ll help you secure your cloud environment confidently. Read o...
Mejora de la seguridad en la nube con acceso JIT para aplicaciones SaaS confidenciales
Using just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege....
Cómo la vulnerabilidad regreSSHion podría impactar a su entorno en la nube
With growing concern over the recently disclosed regreSSHion vulnerability, we’re explaining here what it is, why it’s so significant, what it could mean for your cloud environment and how Tenable Cloud Security can help....
Etiqueta, ¡usted es eso! Etiquetando su camino hacia la excelencia de la seguridad en la nube
To manage your cloud resources effectively and securely, you need to consistently tag assets across all your cloud platforms. Here we explain tagging’s main benefits, as well as proven strategies and best practices for tagging success. ...
Understanding Customer Managed Encryption Keys (CMKs) in AWS, Azure and GCP: A Comparative Insight
Explore critical differences in handling customer-managed encryption keys (CMKs) across AWS, Azure and GCP to avoid security misconfigurations and protect your data effectively....
Protección de la carga de trabajo en la nube: la clave para disminuir los riesgos de seguridad en la nube
Más del 80 % de todas las filtraciones implica datos almacenados en la nube y los equipos de seguridad que no utilizan la protección de la carga de trabajo en la nube (CWP) posiblemente nunca se adelanten a los atacantes que desean acceder a la mayor cantidad de datos posible con el mínimo esfuerzo. A single cloud breach is often the most straightforward way into these...
These Services Shall Not Pass: Abusing Service Tags to Bypass Azure Firewall Rules (Customer Action Required)
Azure customers whose firewall rules rely on Azure Service Tags, pay attention: You could be at risk due to a vulnerability detected by Tenable Research. Here’s what you need to know to determine if you’re affected, and if so, what you should do right away to protect your Azure environment from atta...
How A CNAPP Can Take You From Cloud Security Novice To Native In 10 Steps
Context is critical in cloud security. In a recent RSA presentation, Tenable's Shai Morag offered ten tips for end-to-end cloud infrastructure security....
Qué tomar en cuenta al proteger los volúmenes persistentes de Kubernetes
To many, Kubernetes is a black box that’s difficult to understand, manage and secure. If you’re using stateful persistent volumes – cloud resources that live and manage data outside the scope of your pods – it can be even darker. ...
Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers
Tenable Cloud Security Research Team has recently discovered that Kinsing malware, known for targeting Linux-based cloud infrastructures, exploits Apache Tomcat servers with new advanced stealth techniques. Explore our analysis and the indicators of compromise in this report....