Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

August 1, 2025

Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

September 8, 2023

Instantánea de ciberseguridad: Los profesionales cibernéticos sufren exceso de trabajo, falta de personal y falta de apoyo, y el estrés es considerable

Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Check out what a study found. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. Plus, the U.S. government is alerting about exploits to CVE-2022-47966 and CVE-2022-42475. We als...


September 7, 2023

AA23-250A: Múltiples agentes maliciosos de estados nación explotan CVE-2022-47966 y CVE-2022-42475

A joint Cybersecurity Advisory examines the exploitation of two critical vulnerabilities by nation-state threat actors....


September 7, 2023

El plan de adquisición de Ermetic por parte de Tenable acelerará el valor del cliente en CNAPP y gestión de exposición

The acquisition of cloud security innovator Ermetic, once completed, will add unified, elegantly integrated CNAPP and market-leading CIEM capabilities to the Tenable portfolio....


September 6, 2023

Trayecto hacia las cargas de trabajo contenerizadas: Trampas de seguridad y cómo evitarlas con Tenable Cloud Security 

Tenable Cloud Security now includes built-in container security functionality, so you can detect and prevent insecure containers from being deployed to production. In this blog, you’ll learn how Tenable can help you avoid critical container security mistakes. ...


September 4, 2023

Tenable Cyber Watch: CISA insta a los equipos cibernéticos a prepararse para ataques cuánticos, ataques de ransomware y más

This week’s edition of Tenable Cyber Watch unpacks the emerging threat of quantum computers and the recommended steps security teams should take, and addresses the surge in ransomware attacks. Also covered: The White House and other cyber agencies seek public input on how to best secure open source...


September 1, 2023

Instantánea de ciberseguridad: "Reduzca su entusiasmo por las herramientas de ChatGPT en el trabajo", dijo NCSC del Reino Unido

As OpenAI released ChatGPT Enterprise, the U.K.’s cyber agency warned about the risks of workplace use of AI chatbots. Plus, the QakBot botnet got torn down, but the malware threat remains – what CISA suggests you do. Moreover, new quantum-resistant algorithms are due next year. And much more!...


August 30, 2023

CVE-2023-2868: Barracuda y FBI recomiendan reemplazar dispositivos de puerta de enlace de seguridad de correo electrónico (ESG) ahora mismo

Since October 2022, attackers have been exploiting a zero-day vulnerability in Barracuda Email Security Gateway devices, and both the vendor and the FBI urge customers to replace these devices immediately....


August 30, 2023

The Benefits of Cloud Entitlement Management

Cloud identities and entitlements pose grave challenges - learn about the benefits of CIEM solutions and KPIs for measuring them....


August 30, 2023

Tenable Nessus amplía la cobertura de la superficie de ataque con Web Application Scanning

Web applications can be an Achilles' heel for even the most mature security organizations. For small- and medium-sized businesses, as well as the security consultants and pen testers who support them, unsecured web apps can be a pathway to a data breach that can bring an organization to its knees. H...


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >