Blog de Tenable
Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

El Martes de parches de Microsoft de julio de 2023 aborda 130 CVE (CVE-2023-36884)
Microsoft addresses 130 CVEs including five that were exploited in the wild as zero-day vulnerabilities and guidance on the malicious use of Microsoft signed drivers....
Tenable Cyber Watch: Un estudio descubre que muchos CISO no están calificados para servir en las juntas directivas, cómo la ciberseguridad impulsa a los negocios y más
This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards. ...
Instantánea de ciberseguridad: herramientas como ChatGPT acelerarán a desarrolladores e intensificarán riesgos cibernéticos
Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? And much more!...
An Unexpected Implication of Lambda Privileges
Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance....
Tenable Cyber Watch: Los federales de los EE. UU. ofrecen recompensa de USD 10 millones por información de CL0P, prácticas recomendadas para respuesta ante incidentes y más
This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure t...
Instantánea de ciberseguridad: Mientras las preocupaciones sobre la IA aumentan drásticamente, los expertos envían consejos de seguridad de IA a la Casa Blanca y al Capitolio
Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!...
The Default Toxic Combination of GCP Compute Engine Instances
By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix....
Seguridad de la OT marítima: ¿se avecinan aguas tormentosas o una navegación placentera?
La industria marítima navega en un mar de cambios para la ciberseguridad. Las embarcaciones interconectadas y las nuevas tecnologías que permiten que el mundo marítimo se vuelva más eficiente también presentan riesgos cibernéticos. Here's what you need to know about the challenges and risks these floating cities face —...
Cómo la gestión de la exposición puede hacer que las pruebas de penetración sean más eficaces
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....