Blog de Tenable
Instantánea de ciberseguridad: What Security Pros’ Are Saying About Exposure Management, Risk Prioritization, Tool Sprawl and More
Tenable Cyber Watch: Los proveedores de IoT carecen de divulgaciones de vulnerabilidades, la cibernética se clasifica como la principal preocupación de negocios nuevamente, las frustraciones de la GAO con las agencias federales que no prestan atención a sus consejos de ciberseguridad
This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the GAO's frustrations with federal agencies not heeding their cybersecurity advice and provides…
Instantánea de ciberseguridad: A medida que ChatGPT Fire se intensifica, NIST emite una guía de seguridad en relación a la IA
Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!
El tiempo es ahora para los EE. UU. El gobierno ayudará a impulsar la ciberseguridad en África
African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design.
How Attackers Can Exploit GCP’s Multicloud Workload Solution
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations.
ProxyNotShell, OWASSRF, TabShell: Coloque parches en sus Microsoft Exchange Servers Now
Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended.
Tenable Cyber Watch: Qué piensan los CISO acerca de sus trabajos, por qué los desarrolladores luchan con la seguridad, uso de IA para reducir el riesgo
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back. Ever wonder how happy your CISO is at…
Sandworm APT implementa el nuevo SwiftSlicer Wiper usando la directiva de grupo de Active Directory
Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer.
Instantánea de ciberseguridad: Los proveedores de IoT fallan en las divulgaciones de vulnerabilidades, mientras que las amenazas cibernéticas nuevamente son los principales riesgos para los negocios
Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!
Cómo el análisis de sus datos de superficie de ataque externa impulsa su estrategia de seguridad
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely.