Blog de Tenable
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

Instantánea de ciberseguridad: cómo impulsar la ciberseguridad de los sistemas de IA mientras se minimizan los riesgos
Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and h...
CVE-2023-46805, CVE-2024-21887: vulnerabilidades de Zero-Day explotadas en Ivanti Connect Secure y Policy Secure Gateways
Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors....
El Martes de parches de Microsoft de enero de 2024 aborda 48 CVE (CVE-2024-20674)
Microsoft addresses 48 CVEs in its January 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities....
Construcción de entornos de OT resilientes: protecciones para las instalaciones eléctricas
Los recientes ciberataques contra infraestructura crítica demuestran cómo los hackers pueden aprovechar los sistemas de control industrial. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....
Aprendiendo a amar las auditorías y el cumplimiento, sí es posible
La protección de las cargas de trabajo en ejecución en la nube pública y la observación de las normas de cumplimiento son cuestiones innegociables para la mayoría de las organizaciones. Sin embargo, reunir las capacidades necesarias de visibilidad, correlación y monitoreo frecuentemente es un proceso manual que lleva mucho tiempo. As a result, audits and compliance exercises ...
Instantánea de ciberseguridad: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang
Want to learn more about protecting AI systems from malicious actors? A new NIST guide aims to help you identify and mitigate attacks targeting AI tools. Plus, new granular configuration recommendations for securing Microsoft 365 are out. In addition, the cost of cyber incidents is rising. And there...
$18.2 Million Funding Available for Tribal Government Cybersecurity
The Tribal Cybersecurity Grant Program (TCGP) is accepting applications through January 10, making $18.2 million in federal grant funding available to eligible tribes to reduce cyber risk....
Tenable OT Security: retrospectiva de 2023
As we reflect on the many accomplishments Tenable OT Security achieved in 2023, one thing is clear: we couldn’t have done it without the support and collaboration of our customers and partners....
Instantánea de ciberseguridad: What’s in Store for 2024 in Cyberland? Check Out Tenable Experts’ Predictions for OT Security, AI, Cloud Security, IAM and more
The new year is upon us, and so we ponder the question: What cybersecurity trends will shape 2024? To find out, we asked Tenable experts to read the tea leaves. Their 2024 forecasts include: A bigger security role for cloud architects; a focus by ransomware gangs on OT systems in critical industries...