Blog de Tenable
Exposure Management Beyond The Endpoint

Agentes vs. sin agentes:¿qué solución es la adecuada para su entorno de nube pública?
You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report…
El Martes de parches de Microsoft de abril de 2023 aborda 97 CVE (CVE-2023-28252)
Microsoft addresses 97 CVEs, including one that was exploited in the wild as a zero day.
Los requisitos de TSA y FAA enfatizan la ciberseguridad para los operadores de aeropuertos y aeronaves y los proyectos de terminales aeroportuarias: cómo puede ayudar Tenable
The TSA and FAA are making cybersecurity a priority for airport and aircraft operators and for airport terminal projects to prevent disruption and degradation to their infrastructure. Here's what you need to know — and how Tenable can help.
Tenable Cyber Watch: El gobierno de los EE. UU. considera la prohibición de TikTok, Europol advierte sobre los riesgos cibernéticos de ChatGPT y más
This week’s edition of the Tenable Cyber Watch unpacks the U.S. government’s efforts to ban TikTok and addresses Europol’s concerns about ChatGPT cyber risks. Also covered: How CISA’s new pre-ransomware alert initiative could be a gamechanger for would-be ransomware victims.
Instantánea de ciberseguridad: El uso de ChatGPT puede llegar a provocar violaciones a la privacidad de datos
Learn how businesses can run afoul of privacy laws with generative AI chatbots like ChatGPT. Plus, the job market for cyber analysts and engineers looks robust. Also, cybercrooks lost a major resource with the Genesis Market shutdown. In addition, the six common mistakes cyber teams make. And much…
Terraform Lab: Taking the New VPC Endpoint Condition Keys Out for a Spin
Our new open source Terraform project offers hands-on experience with VPC endpoints and demos AWS's new condition keys for securing EC2 instances
Tenable Cyber Watch: Ayuda para el mapeo de MITRE ATT&CK, por qué las organizaciones luchan con la protección de datos SaaS y más
This week’s edition of the Tenable Cyber Watch unpacks CISA’s new ‘Decider” tool, which aims to streamline MITRE ATT&CK mapping. We also explore why organizations struggle with data protection of software as a service apps. Also covered: Why cyber pros think cloud creates opportunities for cyber…
Instantánea de ciberseguridad: La CISA lanza una herramienta de respuesta a incidentes para Microsoft Cloud Services
Learn about a free tool for detecting malicious activity in Microsoft cloud environments. Plus, Europol warns about ChatGPT cyber risks. Also, how business email compromise (BEC) scammers are stealing merchandise. In addition, CISA alerts orgs about early-stage ransomware breaches. And much more!
Se reporta que la aplicación 3CX Desktop para Windows y macOS ha sido puesta en riesgo en ataque contra cadena de suministro
A softphone desktop application from 3CX, makers of a popular VoIP PBX solution used by over 600,000 organizations, has reportedly been trojanized as part of a supply chain attack