Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.

December 11, 2023

Cómo enfrentar los desafíos de OT: inventario de activos y evaluación de vulnerabilidades

The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help.


December 8, 2023

Instantánea de ciberseguridad: CISA Calls on Software Makers To Use Memory Safe Languages, as OpenSSF Issues Secure Software Principles

CISA is urging developers to stamp out memory vulnerabilities with memory safe programming languages. Meanwhile, the OpenSSF published 10 key principles for secure software development. Plus, malware used in fake browser-update attacks ballooned in Q3. In addition, a new program aims to boost the…


December 6, 2023

CVE-2023-4966 (CitrixBleed): invalide las sesiones activas o persistentes para evitar un mayor riesgo

Patching CitrixBleed isn’t enough; organizations need to invalidate active or persistent session tokens as the these tokens can be used to compromise networks and bypass authentication measures including multifactor authentication


December 4, 2023

Tenable Cyber Watch: CSA lanza la certificación de Zero Trust, CISA actualiza el formulario de certificación de seguridad y más

This week’s edition of Tenable Cyber Watch unpacks CISA’s Security Attestation Form Draft and discusses CSA’s new Zero Trust Certification. Also covered: The FCC’s new pilot program that would help U.S. schools and libraries boost their cybersecurity.


December 1, 2023

Instantánea de ciberseguridad: Los gobiernos de los EE. UU. y el Reino Unido ofrecen asesoría de cómo construir sistemas de IA seguros 

Looking for guidance on developing AI systems that are safe and compliant? Check out new best practices from the U.S. and U.K. cyber agencies. Plus, a new survey shows generative AI adoption is booming, but security and privacy concerns remain. In addition, CISA is warning municipal water plants…


November 30, 2023

Maximice el valor de su escaneo de vulnerabilidades con escaneo autenticado

Want to get a lot more value out of your vulnerability scans? Start doing authenticated scanning


November 27, 2023

AWS Access Analyzer acaba de mejorar, al igual que Tenable Cloud Security

AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA)…


November 27, 2023

Identidades: el tejido conectivo para la seguridad en la nube

Casi todo lo que existe en la nube está a un privilegio excesivo o un error de configuración de sufrir una exposición. La postura adecuada en la nube y una correcta gestión de derechos pueden ayudar a mitigar los riesgos y eliminar las combinaciones tóxicas.


November 27, 2023

Tenable Cyber Watch: NCSC ofrece orientación para la amenaza cuántica, adopción de SBOM para proteger la cadena de suministro de software y más

This week’s edition of Tenable Cyber Watch unpacks what organizations need to do to prepare for quantum computing attacks and addresses SBOM adoption to help organizations beef up the security of the software supply chain. Also covered: El Office of Management and Budget drafts guidance for…


Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.