Tenable Nessus amplía la cobertura de la superficie de ataque con Web Application Scanning
Web applications can be an Achilles' heel for even the most mature security organizations. For small- and medium-sized businesses, as well as the security consultants and pen testers who support them, unsecured web apps can be a pathway to a data breach that can bring an organization to its knees. H...
Tenable Cyber Watch: La Administración Biden tiene como objetivo limitar las inversiones de los EE.UU en de IA china, CISA emite Plan Estratégico de Ciberseguridad y más
This week’s edition of Tenable Cyber Watch unpacks the White House’s new executive order seeking to limit U.S. investments in Chinese AI and addresses the cause behind most cloud breaches. Also covered: CISA’s new cybersecurity strategic plan. ...
Instantánea de ciberseguridad: CISO valoran prevención sobre respuesta, CISA insta a equipos cibernéticos a prepararse para ataques cuánticos
Time to start prepping for the quantum computing threat? CISA thinks so. Plus, why security leaders are prioritizing security prevention tools. Also, find out why ransomware attacks surged in July. Oh, and the White House wants your input on open source security. And much more!...
CVE-2023-38035: Ivanti Sentry API Autenticación Bypass Zero-Day explotado en la realidad
For the third time in a month, Ivanti discloses a zero-day vulnerability in one of its products that has been exploited in the wild...
Tenable Cyber Watch: La Casa Blanca aborda la escasez de habilidades cibernéticas, el costo de las filtraciones de datos sigue aumentando y más
This week’s edition of Tenable Cyber Watch unpacks the White House’s new initiative to tackle the cyber skills shortage and addresses the surge data breach costs. Also covered: NSA and CISA’s security guidance for 5G network slicing. ...
Instantánea de ciberseguridad: La Guía de CIS describe cómo obtener las bases para una higiene cibernética accesible
The Center for Internet Security unpacks how to establish foundational cyber hygiene at a reasonable cost. Plus, the Cyber Safety Review Board issues urgent security recommendations on its Lapsus$ report – and announces it’ll next delve into cloud security. Moreover, are humans or AI better at craft...
The Next Step in the IMDSv1 Redemption Journey
Learn about AWS’s new open source library for enforcing IMDSv2 and Tenable Cloud Security’s new lab for trying it out....
La captura de la bandera de Tenable en 2023: Y los ganadores son...
It's time to crown the winners of this year's Capture the Flag Event!...
Tenable Cyber Watch: Puntos destacados de Black Hat USA, SANS lanza el informe 2023 sobre conocimiento de seguridad y más
This week’s edition of Tenable Cyber Watch dishes out five hot takes from Black Hat USA and provides guidance on how to better mitigate shadow IT risks. Also covered: How you can boost your security awareness program. ...
Instantánea de ciberseguridad: El gobierno de los EE. UU. Se premiará con millones en el Concurso de herramientas cibernéticas de IA, mientras que NIST renueva el marco de ciberseguridad
Got an idea for a new AI-based cybersecurity product? You could win millions in a new contest. Meanwhile, NIST has drafted a major revision to the CSF 2.0 and wants your opinion about it. Also, there’s a new free tool that flags security flaws in public AI models. Plus, most cloud breaches are cause...
Presentando ExposureAI en Tenable One: conozca el futuro de la ciberseguridad preventiva
La plataforma de gestión de exposición Tenable One ya está transformando la manera en que las organizaciones aplican la ciberseguridad preventiva. Now, with the introduction of ExposureAI, users can unleash the full potential of generative artificial intelligence to stay one step ahead of attackers....
Secure Your AWS EC2 Instance Metadata Service (IMDS)
Read this review of IMDS, an important AWS EC2 service component, to understand its two versions and improve your AWS security....