Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

March 20, 2024

Como proteger seus ativos de TI, OT e IoT com uma plataforma de gerenciamento de exposição: visibilidade completa com inventário e descoberta de ativos

Explore como o Tenable One para OT/IoT ajuda as organizações a permanecerem à frente no atual cenário de ameaças em constante evolução, com visibilidade completa e priorização de riscos cibernéticos em TI, OT e IoT.


March 19, 2024

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters…


March 19, 2024

Atrasos recentes no NVD não afetarão os clientes do Tenable Vulnerability Management graças às nossas diversas fontes de pontuação

NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable Vulnerability Management customers because our vulnerability scoring is based on multiple sources.


March 18, 2024

Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment

Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges…


March 18, 2024

Como identificar envenenamento de cache da web e armadilha de cache da web: How Tenable Web App Scanning Can Help

Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some common attack paths are so challenging to mitigate and how Tenable Web App Scanning can help.


March 15, 2024

Cybersecurity Snapshot: CISA destaca a segurança na nuvem e a integração dos sistemas de IAM híbridos

Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against Microsoft. And don’t miss the latest CIS Benchmarks. e muito mais.


March 14, 2024

CVE-2023-48788: Vulnerabilidade crítica de injeção de SQL do FortiClient EMS da Fortinet

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.


March 13, 2024

Apresentação do Tenable AI Assistant: seu analista de IA generativa para obter segurança proativa

Context is critical when it comes to analyzing and prioritizing your exposures. Learn how Tenable AI Assistant, your new Gen AI-based security analyst, can help you answer specific questions, interpret exposure findings and respond to security issues faster than ever.


March 12, 2024

O patch de terça-feira de março de 2024 da Microsoft aborda 59 CVEs (CVE-2024-21407)

Microsoft addresses 59 CVEs in its March 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities.


March 12, 2024

O que está reservado para os parceiros da Tenable este ano? Muito crescimento, incluindo 25 mil árvores!

Tenable distributors, resellers and MSSPs will see enhancements to our award-winning channel program, from a boost in professional services enablement to – wait for it – planting 25,000 trees with our partners.


March 11, 2024

Como proteger todos os seus ativos de TI, OT e IoT com uma plataforma de gerenciamento de exposição: a importância da priorização contextual

Descubra como a priorização contextual de exposição está revolucionando a segurança de OT/IoT, permitindo que as organizações migrem da prevenção de violações reativa para a proativa.


March 8, 2024

Cybersecurity Snapshot: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And…


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

A falha Apache Log4j coloca software de terceiros em evidência

Veja os detalhes >

× Contact our sales team