Blog de Tenable
Instantánea de ciberseguridad: What Security Pros’ Are Saying About Exposure Management, Risk Prioritization, Tool Sprawl and More
Instantánea de ciberseguridad: Si la recesión llega, los equipos de Infosec esperaban sufrir la menor cantidad de pérdidas de empleos
Find out why a study says cybersecurity pros will weather staff reductions better than all other employees. Plus, AI abuse concerns heat up as users jailbreak ChatGPT. Also, learn all about the ransomware threat from North Korea aimed at hospitals. Then check out how the Reddit breach has put…
Agencias surcoreanas y estadounidenses dan a conocer advertencia conjunta sobre ransomware norcoreano
Several South Korean and American agencies have released a joint cybersecurity advisory on North Korean state-sponsored ransomware operators.
Cómo las alianzas de la industria apoyan la adopción de un abordaje proactivo y preventivo hacia la ciberseguridad
Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes resolution among multiple technical teams over a weekend demonstrates how proactive collaboration can…
El Martes de parches de febrero de 2023 de Microsoft aborda 75 CVE (CVE-2023-23376)
Microsoft addresses 75 CVEs including three zero-day vulnerabilities that were exploited in the wild.
Navegar por las recomendaciones federales de ciberseguridad para los servicios públicos de agua: cómo puede ayudar Tenable
Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and…
Cyber Watch: Un vistazo al marco de riesgos de IA del NIST, protección de los empleados contra estafas, cómo hablar con sus contrapartes de negocios y más
Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for protecting your employees from money-transfer scams. Learning to secure AI? Curious to know how…
Instantánea de ciberseguridad: Echa un vistazo a nuestra entrevista sin restricciones con ChatGPT
We pulled no punches in our question-and-answer session with ChatGPT: Find out what the world’s most famous AI chatbot had to say. Plus, CISA and the FBI offer help in dealing with a massive ransomware campaign. Also, are CIOs becoming de-facto CISOs? And cyber attackers are aiming at finance and…
How to Implement CIEM – A Checklist
What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out.
Cómo extraer datos y valor de la solución EASM de Tenable
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data.