Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

December 19, 2025

Instantánea de ciberseguridad: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say

Formerly “AI shy” cyber pros have done a 180 and become AI power users, as AI forces data security changes, the CSA says. Plus, PwC predicts orgs will get serious about responsible AI usage in 2026, while the NCSC states that, no, prompt injection isn’t the new SQL injection. ¡Y mucho más!

December 15, 2023

Instantánea de ciberseguridad: ¿Implementación de IA con seguridad? Nueva agrupación de la industria compilará prácticas recomendadas de seguridad de IA

A group that includes the Cloud Security Alliance, CISA and Google is working to compile a comprehensive collection of best practices for secure AI use. Meanwhile, check out a draft of secure configuration recommendations for the Google Workspace suite. Plus, MITRE plans to release a threat model…


December 13, 2023

Los chicos no están seguros: las vulnerabilidades en Edulog Portal revelaron datos de ubicación de estudiantes de jardín de niños hasta 12vo grado

Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control.


December 12, 2023

Revisión anual del Martes de parches de Microsoft 2023

Microsoft addressed over 900 CVEs as part of Patch Tuesday releases in 2023, including over 20 zero-day vulnerabilities.


December 12, 2023

El Martes de parches de diciembre de 2023 de Microsoft aborda 33 CVE (CVE-2023-36019)

Microsoft addresses 33 CVEs in its December 2023 Patch Tuesday release, with no zero-day vulnerabilities disclosed this month.


December 11, 2023

Tenable Cyber Watch: escasez de habilidades cibernéticas en 2023, la habilidad de tecnología cibernética más solicitada en 2023 y más

This week edition of Tenable Cyber Watch unpacks the 2023 cyber skills shortage and addresses the most sought-after cyber skills in 2023. Also covered: The most in-demand cybersecurity jobs from 2023 according to COMPTIA's "State of the Tech Workforce Report." Why did CISA urge AI vendors to…


December 11, 2023

Cómo enfrentar los desafíos de OT: inventario de activos y evaluación de vulnerabilidades

The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help.


December 8, 2023

Instantánea de ciberseguridad: CISA Calls on Software Makers To Use Memory Safe Languages, as OpenSSF Issues Secure Software Principles

CISA is urging developers to stamp out memory vulnerabilities with memory safe programming languages. Meanwhile, the OpenSSF published 10 key principles for secure software development. Plus, malware used in fake browser-update attacks ballooned in Q3. In addition, a new program aims to boost the…


December 6, 2023

CVE-2023-4966 (CitrixBleed): invalide las sesiones activas o persistentes para evitar un mayor riesgo

Patching CitrixBleed isn’t enough; organizations need to invalidate active or persistent session tokens as the these tokens can be used to compromise networks and bypass authentication measures including multifactor authentication


December 4, 2023

Tenable Cyber Watch: CSA lanza la certificación de Zero Trust, CISA actualiza el formulario de certificación de seguridad y más

This week’s edition of Tenable Cyber Watch unpacks CISA’s Security Attestation Form Draft and discusses CSA’s new Zero Trust Certification. Also covered: The FCC’s new pilot program that would help U.S. schools and libraries boost their cybersecurity.


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Un vistazo al Ecosistema de ransomware

Descargar el informe >

× Póngase en contacto con nuestro equipo de ventas