Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

August 1, 2025

Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

July 11, 2023

El Martes de parches de Microsoft de julio de 2023 aborda 130 CVE (CVE-2023-36884)

Microsoft addresses 130 CVEs including five that were exploited in the wild as zero-day vulnerabilities and guidance on the malicious use of Microsoft signed drivers....


July 10, 2023

Tenable Cyber Watch: Un estudio descubre que muchos CISO no están calificados para servir en las juntas directivas, cómo la ciberseguridad impulsa a los negocios y más

This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards. ...


July 7, 2023

Instantánea de ciberseguridad: herramientas como ChatGPT acelerarán a desarrolladores e intensificarán riesgos cibernéticos

Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? And much more!...


July 4, 2023

An Unexpected Implication of Lambda Privileges

Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance....


July 3, 2023

Tenable Cyber Watch: Los federales de los EE. UU. ofrecen recompensa de USD 10 millones por información de CL0P, prácticas recomendadas para respuesta ante incidentes y más

This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure t...


June 30, 2023

Instantánea de ciberseguridad: Mientras las preocupaciones sobre la IA aumentan drásticamente, los expertos envían consejos de seguridad de IA a la Casa Blanca y al Capitolio 

Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!...


June 29, 2023

The Default Toxic Combination of GCP Compute Engine Instances

By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix....


June 29, 2023

Seguridad de la OT marítima: ¿se avecinan aguas tormentosas o una navegación placentera?

La industria marítima navega en un mar de cambios para la ciberseguridad. Las embarcaciones interconectadas y las nuevas tecnologías que permiten que el mundo marítimo se vuelva más eficiente también presentan riesgos cibernéticos. Here's what you need to know about the challenges and risks these floating cities face —...


June 28, 2023

Cómo la gestión de la exposición puede hacer que las pruebas de penetración sean más eficaces

Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >