Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable
Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters effortl...
Los retrasos recientes de NVD no afectarán a los clientes de Tenable Vulnerability Management gracias a nuestras diversas fuentes de puntuación
NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable Vulnerability Management customers because our vulnerability scoring is based on multiple sources....
Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment
Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges inv...
Identificación de envenenamiento y engaño de la caché web: cómo puede ayudar Tenable Web App Scanning
Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some common attack paths are so challenging to mitigate and how Tenable Web App Scanning can help....
Instantánea de ciberseguridad: CISA arroja luz sobre la seguridad en la nube y la integración de sistemas híbridos IAM
Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against Microsoft. And don’t miss the latest CIS Benchmarks. And much more!...
CVE-2023-48788: vulnerabilidad de inyección SQL crítica de Fortinet FortiClientEMS
Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software....
Presentamos Tenable AI Assistant: su analista de IA generativa para poder obtener seguridad proactiva
El contexto es fundamental cuando se trata de analizar y priorizar sus exposiciones. Learn how Tenable AI Assistant, your new Gen AI-based security analyst, can help you answer specific questions, interpret exposure findings and respond to security issues faster than ever. ...
El Martes de parches de Microsoft de marzo de 2024 aborda 59 CVE (CVE-2024-21407)
Microsoft addresses 59 CVEs in its March 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities....
¿Qué habrá para los socios de Tenable este año? ¡Mucho crecimiento, incluyendo 25 000 árboles!
Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our partners....
Cómo proteger todos sus activos de TI, OT e IoT con una plataforma de gestión de exposición: la importancia de la priorización contextual
Discover how contextual prioritization of exposure is revolutionizing OT/IoT security, enabling organizations to shift from reactive to proactive breach prevention....
Instantánea de ciberseguridad: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023
More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And much...
CVE-2024-27198, CVE-2024-27199: Dos vulnerabilidades de evasión de autenticación en JetBrains TeamCity
Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution....