Cinco principios fundamentales para la seguridad de la nube híbrida
How to build a hybrid-cloud security strategy that is effective, scalable and affordable. ...
Gestión de exposición: 7 beneficios de un abordaje de plataforma
Cuando se trata de ciberseguridad preventiva, ha habido debates desde hace mucho tiempo sobre si es más efectivo operar una variedad de las mejores soluciones puntuales o adoptar un abodaje de plataforma más consolidado. Here are seven reasons an exposure management platform can help reduce cyber risk....
La EPA emite regulaciones de ciberseguridad para sistemas públicos de agua: cómo puede ayudar Tenable
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....
Las novedades en Tenable OT Security: detección de activos de TI/OT/IoT, detección de amenazas avanzada y más
Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk....
Los desafíos del cumplimiento multinube
Las organizaciones que utilizan nubes públicas como Amazon Web Services (AWS), Microsoft Azure y Google Cloud Platform (GCP) son conscientes de que cada plataforma funciona a su manera, y de que esas diferencias presentan desafíos a la hora de protegerlas. In a recent episode of the Tenable Cloud Security Coffee Break we...
Por qué las herramientas de terceros son las mejores para CSPM multinube
Cloud security posture management enables organizations using multiple public cloud platforms like AWS, Azure and GCP to see everything they have running and where their security risks lie. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenge...
Navegar por las recomendaciones federales de ciberseguridad para los servicios públicos de agua: cómo puede ayudar Tenable
Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and how...
Cómo extraer datos y valor de la solución EASM de Tenable
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data....
Cómo el análisis de sus datos de superficie de ataque externa impulsa su estrategia de seguridad
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....
Tenable.sc 6.0: Una actualización importante que aumenta la visibilidad y la productividad
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...
Active Directory Vulnerabilities: How Threat Actors Leverage AD Flaws in Ransomware Attacks
Adopting a proactive stance will give enterprises the head start to shut down new threats to Active Directory whenever they are uncovered....
Tenable.io: To control or not to control, that is the question
For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to im...