Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

August 1, 2025

Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

August 28, 2023

Tenable Cyber Watch: La Administración Biden tiene como objetivo limitar las inversiones de los EE.UU en de IA china, CISA emite Plan Estratégico de Ciberseguridad y más

This week’s edition of Tenable Cyber Watch unpacks the White House’s new executive order seeking to limit U.S. investments in Chinese AI and addresses the cause behind most cloud breaches. Also covered: CISA’s new cybersecurity strategic plan. ...


August 25, 2023

Instantánea de ciberseguridad: CISO valoran prevención sobre respuesta, CISA insta a equipos cibernéticos a prepararse para ataques cuánticos

Time to start prepping for the quantum computing threat? CISA thinks so. Plus, why security leaders are prioritizing security prevention tools. Also, find out why ransomware attacks surged in July. Oh, and the White House wants your input on open source security. And much more!...


August 22, 2023

CVE-2023-38035: Ivanti Sentry API Autenticación Bypass Zero-Day explotado en la realidad

For the third time in a month, Ivanti discloses a zero-day vulnerability in one of its products that has been exploited in the wild...


August 21, 2023

Tenable Cyber Watch: La Casa Blanca aborda la escasez de habilidades cibernéticas, el costo de las filtraciones de datos sigue aumentando y más

This week’s edition of Tenable Cyber Watch unpacks the White House’s new initiative to tackle the cyber skills shortage and addresses the surge data breach costs. Also covered: NSA and CISA’s security guidance for 5G network slicing. ...


August 18, 2023

Instantánea de ciberseguridad: La Guía de CIS describe cómo obtener las bases para una higiene cibernética accesible

The Center for Internet Security unpacks how to establish foundational cyber hygiene at a reasonable cost. Plus, the Cyber Safety Review Board issues urgent security recommendations on its Lapsus$ report – and announces it’ll next delve into cloud security. Moreover, are humans or AI better at craft...


August 17, 2023

The Next Step in the IMDSv1 Redemption Journey

Learn about AWS’s new open source library for enforcing IMDSv2 and Tenable Cloud Security’s new lab for trying it out....


August 14, 2023

La captura de la bandera de Tenable en 2023: Y los ganadores son...

It's time to crown the winners of this year's Capture the Flag Event!...


August 14, 2023

Tenable Cyber Watch: Puntos destacados de Black Hat USA, SANS lanza el informe 2023 sobre conocimiento de seguridad y más

This week’s edition of Tenable Cyber Watch dishes out five hot takes from Black Hat USA and provides guidance on how to better mitigate shadow IT risks. Also covered: How you can boost your security awareness program. ...


August 11, 2023

Instantánea de ciberseguridad: El gobierno de los EE. UU. Se premiará con millones en el Concurso de herramientas cibernéticas de IA, mientras que NIST renueva el marco de ciberseguridad

Got an idea for a new AI-based cybersecurity product? You could win millions in a new contest. Meanwhile, NIST has drafted a major revision to the CSF 2.0 and wants your opinion about it. Also, there’s a new free tool that flags security flaws in public AI models. Plus, most cloud breaches are cause...


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >