Blog de Tenable
Instantánea de ciberseguridad: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Los cambios en nombres de productos de Tenable y la evolución de la marca Tenable
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. ...
Tenable Cyber Watch: La Casa Blanca da a conocer una inversión de USD 140 millones para la IA responsable, principales 5 malwares en el 1er trimestre de 2023 y más
This week’s edition of the Tenable Cyber Watch unpacks the White House’s $140 million dollar investment into AI research and development and explores the security implications of ChatGPT. Also covered: The top 5 malware strains for Q1 2023. ...
Instantánea de ciberseguridad: Cómo aumentar la confianza de los clientes en sus servicios digitales
Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. And much more!...
El papel del código abierto en la seguridad en la nube: un caso de estudio, Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...
El Martes de parches de Microsoft de mayo de 2023 aborda 38 CVE (CVE-2023-29336)
Microsoft addresses 38 CVEs including three zero-day vulnerabilities, two of which were exploited in the wild....
La integración de Tenable Security Center en Tenable One proporciona gestión de exposición completa para los clientes con implementaciones locales
Con la integración de Tenable Security Center en Tenable One, Tenable se convierte en el único proveedor que ofrece gestión de exposición para modelos de implementación tanto local como híbrida. Here’s what you need to know. ...
Cuidado con la brecha: Cómo la espera de NVD coloca a su organización en riesgo
This is the first of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. We explore the impact of that gap on an organization’s cyber risk and discuss how Tenable can help....
Cuidado con la brecha: Cómo los marcos de vulnerabilidades existentes pueden dejar a una organización expuesta
This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and dis...
Cuidado con la brecha:Una vistazo más de cerca a las vulnerabilidades divulgadas en 2022
This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable ca...