Tenable Cyber Watch: ¿Qué predicen nuestros expertos para 2023?
Banish the post-holiday blues with news you can use: this week's episode of Tenable Cyber Watch takes a look at four cybersecurity trends to watch for 2023. Learn how extortion tactics will reshape ransomware, OT security, SaaS worries and protecting the cloud are top of mind for our experts....
Instantánea de ciberseguridad: Datos clave de 2022 para seguridad en la nube, gestión de vulnerabilidades, EASM, seguridad de aplicaciones web y más
As 2022 ends, we highlight important data points that shine a light on the trends, challenges and best practices that matter to cybersecurity leaders eager to boost their exposure management and reduce their organizations’ cyber risk. ...
Instantánea de ciberseguridad: Seis predicciones de Tenable para 2023
Mientras el año de 2022 llegaba a su fin, preguntamos a los expertos de Tenable lo que esperaban para el nuevo año.After reading the tea leaves, they’re forecasting developments in extortion attacks, OT security, SaaS threats, metaverse risks and more!...
Tenable Cyber Watch: Vigilancia del metaverso, protección de IA y ML, la amenaza de Daixin para los hospitales y el cambio a las plataformas cibernéticas integradas
To help you zap those Monday blahs, here’s a caffeinated shot of cyber news you can use: Police chiefs must get hip to the metaverse. CISOs are shifting to integrated cybersecurity platforms. There's new guidance for securing ML and AI systems. Hospitals face a ransomware threat from the Daixin cybe...
Instantánea de ciberseguridad: Estafas de phishing, tendencias de salarios, riesgos del metaverso, Log4J Poll
Get the latest on worrisome phishing stats; businesses’ embrace of the metaverse, come what may; a (small) improvement in CISO job stability; the compensation cost of security leaders; and more!...
Cómo evaluar la preparación de la ciberseguridad de proveedores de servicios de TI y MSP
Improperly evaluating the cybersecurity capabilities of prospective IT service providers and managed service providers (MSPs) can put your organization's data and systems at risk. A new guide from CompTIA can help you ask the right questions....
Tenable Cyber Watch: Los desafíos de la aceleración de la detección (shift left), los esfuerzos anti-ransomware, los riesgos cuánticos y la ansiedad de los CISO
Beat the Monday blues with cyber news you can use | Shift-left efforts falling short. The White House’s war on ransomware. Everything you’ve ever wanted to know about CISOs. The quantum computing risk for critical infrastructure. Don’t miss the latest episode of the Tenable Cyber Watch. The weekl...
Instantánea de ciberseguridad: Aniversario de Log4j, riesgos de CI/CD, Infostealers (ladrones de información), ataques contra correo electrónico, seguridad de OT
Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! ...
Seguridad en la nube: cinco conclusiones clave de la encuesta SANS DevSecOps
Un informe reciente del SANS Institute revela que los equipos de DevSecOps están mejorando sus herramientas, procesos y técnicas, pero los entornos de TI cada vez más híbridos y multinube de sus organizaciones son cada vez más difíciles de proteger. Check out key highlights from the “SANS 2022 DevSecOps Survey.”...
Are You Ready for the Next Log4Shell? Tenable’s CSO and CIO Offer Their Advice
Tenable CIO Patricia Grant and CSO Robert Huber share insights and best practices to help IT and cybersecurity leaders and their teams weather the next cyber crisis of Log4j proportions....
Introducing the Tenable Cyber Watch, Your Weekly Cyber Newscast
Cybersecurity professionals are inundated with too much information. Separating the signal from the noise is hard. The Tenable Cyber Watch is here to help. Today, Tenable launches Cyber Watch, a weekly video news program highlighting topics that are top-of-mind for cybersecurity professionals aro...
Instantánea de ciberseguridad: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory
Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more! ...