El estudio de Tenable Cloud Security revela que un preocupante 95 % de las organizaciones encuestadas sufrió filtraciones relacionadas con la nube en un plazo de 18 meses
El hallazgo del estudio Perspectiva de seguridad en la nube para 2024 de Tenable es un indicador clave de la necesidad de contar con una seguridad en la nube que sea robusta y proactiva. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud infrastruc...
Tenable Bolsters Its Cloud Security Arsenal with Malware Detection
Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution. ...
FlowFixation: La vulnerabilidad de secuestro del servicio de AWS Apache Airflow y por qué descuidar las protecciones pone en riesgo a los principales CSP
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of m...
Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable
Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters effortl...
Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment
Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges inv...
Managed Kubernetes: Is It Right for My Organization?
As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your Kubernetes clusters? And should your organization host its Kubernetes deployments or instead choose a manage...
How a Serverless Architecture Can Help You Secure Cloud-Native Applications
Cybersecurity teams often struggle with securing cloud-native applications, which are becoming increasingly popular with developers. The good news is that deploying these applications on a serverless architecture can make it easier to protect them. Here’s why....
Los líderes de seguridad en la nube hablan de los desafíos clave
Too many identities, systems and cooks in the kitchen cloud an already complex mandate....
Suba de nivel su estrategia de seguridad en la nube
Learn how to better your cloud security program with these ten security resolutions. ...
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....
Más allá del horizonte: Las 5 principales tendencias de seguridad en la nube para observar en 2024
La IA generativa sin duda impulsará las capacidades de ciberseguridad de las organizaciones. Sin embargo, los departamentos de ciberseguridad obtendrán pocos beneficios de la IA generativa sin primero aplicar principios sólidos de seguridad en la nube. In this blog, we explain the top cloud security trends that organizations must track – an...
Exfiltrated, Signed, Delivered – What Can Go Wrong When an Amazon Elastic Compute Cloud (EC2) Instance is Exposed to SSRF
Using CNAPPgoat, you can now experiment with a technique that leverages exposure to SSRF to trigger calls to AWS services from within an Amazon EC2 instance. ...