Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

September 10, 2025

Shift from Reactive to Proactive: Leveraging Tenable Exposure Management for MSSP Success

An Exposure Management as a Service offering allows MSSPs to unify security visibility, insight and action across the attack surface to prioritize actions and enable innovation that is secure and compliant. Whether you’re already leveraging Tenable Vulnerability Management as a Service or you’re just starting a service offering, we’ve got guidance for you.

May 2, 2025

Instantánea de ciberseguridad: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and More

In this special edition of the Cybersecurity Snapshot, we’re highlighting some of the most valuable guidance offered by the U.S. Cybersecurity and Infrastructure Security Agency in the past 12 months. Check out best practices, recommendations and insights on protecting your cloud environments, OT…


30 de abril de 2025

MCP Prompt Injection: Not Just For Evil

MCP tools are implicated in several new attack techniques. Here's a look at how they can be manipulated for good, such as logging tool usage and filtering unauthorized commands.


30 de abril de 2025

El futuro de la gestión del acceso a la nube: ¿cómo Tenable Cloud Security redefine el acceso justo a tiempo?

Los abordajes tradicionales de acceso en la nube se basan en permisos estáticos y permanentes que frecuentemente tienen privilegios excesivos. Descubra cómo el acceso justo a tiempo cambia completamente las reglas del juego.


28 de abril de 2025

Exposure Management Works When the CIO and CSO Are in Sync

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program.


25 de abril de 2025

La reducción del tiempo de corrección sigue siendo un desafío: cómo puede ayudar Tenable Vulnerability Watch

Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Here’s how Tenable’s Vulnerability Watch classification system…


25 de abril de 2025

CVE-2025-31324: Vulnerabilidad de día cero en SAP NetWeaver explotada en la realidad

SAP has released out-of-band patch to address CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver that has been exploited by threat actors. Organizations are strongly encouraged to apply patches as soon as possible.


25 de abril de 2025

Instantánea de ciberseguridad: Verizon DBIR Finds Attackers Feast on Vulnerability Exploits for Initial Access, While MITRE ATT&CK Adds Mobile, Cloud, ESXi Threat Intel

Check out highlights from this year’s Verizon DBIR, including a surge in zero-day exploits targeting edge devices and VPNs. Plus, find out what’s new in the latest version of MITRE ATT&CK. Also, see what Tenable webinar attendees said about AI security. And get the latest on ransomware preparedness…


24 de abril de 2025

A pesar del reciente endurecimiento de la seguridad, la función de sincronización de Entra ID permanece susceptible a vulneraciones perpetradas por atacantes

Microsoft synchronization capabilities for managing identities in hybrid environments are not without their risks. In this blog, Tenable Research explores how potential weaknesses in these synchronization options can be exploited.


23 de abril de 2025

Seguridad en la nube más robusta en cinco minutos: Cómo proteger sus cargas de trabajo en la nube

In the first installment of Tenable’s “Stronger Cloud Security in Five” blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. Today, we turn to securing cloud workloads, which are the…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >