Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

August 1, 2025

Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

November 27, 2023

AWS Access Analyzer acaba de mejorar, al igual que Tenable Cloud Security

AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA) all...


November 27, 2023

Identidades: el tejido conectivo para la seguridad en la nube

Casi todo lo que existe en la nube está a un privilegio excesivo o un error de configuración de sufrir una exposición. Proper cloud posture and entitlement management can help mitigate risk and eliminate toxic combinations....


November 27, 2023

Tenable Cyber Watch: NCSC ofrece orientación para la amenaza cuántica, adopción de SBOM para proteger la cadena de suministro de software y más

This week’s edition of Tenable Cyber Watch unpacks what organizations need to do to prepare for quantum computing attacks and addresses SBOM adoption to help organizations beef up the security of the software supply chain. Also covered: El Office of Management and Budget drafts guidance for fe...


November 24, 2023

Instantánea de ciberseguridad: El gobierno de los EE. UU. revisa y busca información con cuestionario de evaluación de seguridad para proveedores de software

Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. Plus, it’s warning cyber teams about the threats from the Rhysida and Scattered Spider cybercrime groups. In addition, the...


November 21, 2023

Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security

CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads....


November 20, 2023

Preguntas frecuentes para CitrixBleed (CVE-2023-4966)

Frequently asked questions relating to a critical vulnerability in Citrix NetScaler that has been under active exploitation for over a month, including by ransomware groups....


November 20, 2023

Tenable Cyber Watch: Noviembre fue declarado el mes de seguridad y resiliencia de infraestructura crítica y más

This week’s edition of Tenable Cyber Watch unpacks Critical Infrastructure Security and Resilience month and addresses the “Shields Ready” campaign aimed at promoting critical infrastructure security and resilience. Also covered: Do most organizations need a generative AI policy? What one poll shows...


November 17, 2023

Instantánea de ciberseguridad: Are SBOMs on Your Supply Chain Security Radar Screen? Check Out New Recommendations from CISA and NSA

The SBOM concept is still half-baked, but CISA and NSA want to help change that with new best practices for software vendors, developers and buyers. Plus, there’s new guidance about the Royal ransomware gang – as ransomware attacks grow. In addition, Google highlights a new typosquatting trend impac...


November 15, 2023

Tenable Nessus Scanner Capabilities Receive Red Hat Recognition

La certificación Red Hat Vulnerability Scanner para Tenable Nessus refleja nuestro compromiso en continuar proporcionando a los clientes visibilidad hacia sus sistemas Red Hat Enterprise Linux.Read about what this means and how it benefits our customers....


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >