Blog de Tenable
Instantánea de ciberseguridad: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say
Instantánea de ciberseguridad: Los gobiernos de los EE. UU. y el Reino Unido ofrecen asesoría de cómo construir sistemas de IA seguros
Looking for guidance on developing AI systems that are safe and compliant? Check out new best practices from the U.S. and U.K. cyber agencies. Plus, a new survey shows generative AI adoption is booming, but security and privacy concerns remain. In addition, CISA is warning municipal water plants…
Maximice el valor de su escaneo de vulnerabilidades con escaneo autenticado
Want to get a lot more value out of your vulnerability scans? Start doing authenticated scanning
AWS Access Analyzer acaba de mejorar, al igual que Tenable Cloud Security
AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA)…
Identidades: el tejido conectivo para la seguridad en la nube
Casi todo lo que existe en la nube está a un privilegio excesivo o un error de configuración de sufrir una exposición. La postura adecuada en la nube y una correcta gestión de derechos pueden ayudar a mitigar los riesgos y eliminar las combinaciones tóxicas.
Tenable Cyber Watch: NCSC ofrece orientación para la amenaza cuántica, adopción de SBOM para proteger la cadena de suministro de software y más
This week’s edition of Tenable Cyber Watch unpacks what organizations need to do to prepare for quantum computing attacks and addresses SBOM adoption to help organizations beef up the security of the software supply chain. Also covered: El Office of Management and Budget drafts guidance for…
Instantánea de ciberseguridad: El gobierno de los EE. UU. revisa y busca información con cuestionario de evaluación de seguridad para proveedores de software
Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. Plus, it’s warning cyber teams about the threats from the Rhysida and Scattered Spider cybercrime groups. In addition,…
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads.
Preguntas frecuentes para CitrixBleed (CVE-2023-4966)
Frequently asked questions relating to a critical vulnerability in Citrix NetScaler that has been under active exploitation for over a month, including by ransomware groups.
Tenable Cyber Watch: Noviembre fue declarado el mes de seguridad y resiliencia de infraestructura crítica y más
This week’s edition of Tenable Cyber Watch unpacks Critical Infrastructure Security and Resilience month and addresses the “Shields Ready” campaign aimed at promoting critical infrastructure security and resilience. Also covered: Do most organizations need a generative AI policy? What one poll…