Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

June 30, 2023

Cybersecurity Snapshot: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill 

Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!...


June 29, 2023

The Default Toxic Combination of GCP Compute Engine Instances

By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix....


June 29, 2023

Segurança de OT no setor marítimo: tempestade à frente ou içar velas?

O setor marítimo está navegando em um mar de mudanças quando falamos em segurança cibernética. As embarcações interconectadas e as novas tecnologias que permitem que o mundo da navegação se torne mais eficiente também introduzem o risco cibernético. Here's what you need to know about the challenges and risks these floating cities face —...


June 28, 2023

How Exposure Management Can Make Pen Testing More Effective

Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....


June 27, 2023

Uma maneira prática de reduzir o risco no chão de fábrica

Existe muita informação sobre segurança cibernética para manufatura, mas por onde começar? Vamos simplificar e abordar por que os invasores fazem o que fazem e como você pode detê-los. Trata-se de reduzir riscos e maximizar seus esforços para obter os melhores resultados. Read on to learn mor...


June 26, 2023

CVSSv4 is Coming: What Security Pros Need To Know

The latest revision of the industry standard for ranking vulnerabilities has some changes that practitioners will find useful. Here, we'll discuss them, as well as Tenable' plans to implement the scoring system in its products....


June 26, 2023

Tenable Cyber Watch: O DBIR da Verizon alerta sobre BEC, ransomware, as principais preocupações dos CISOs sobre segurança da nuvem e mais

This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’ coun...


June 23, 2023

CVE-2023-33299: Vulnerabilidade crítica de execução remota de código no FortiNAC

Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC...


June 23, 2023

Cybersecurity Snapshot: As Feds Hunt CL0P Gang, Check Out Tips on Ransomware Response, Secure Cloud Management and Cloud App Data Privacy

Learn all about the U.S. government’s reward for CL0P ransomware leads. Plus, check out ransomware incident response recommendations. Also, review concrete guidance on cloud system administration and on designing cloud apps with privacy by default. And much more!...


June 21, 2023

Shared Responsibility Model in the Cloud

CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture....


June 19, 2023

Tenable Cyber Watch: Governo dosO governo atualiza o guia de ransomware, o estudo Lineaje revela os riscos da cadeia de suprimentos em OSS e muito mais

This week’s edition of the Tenable Cyber Watch unpacks the most recent updates to the U.S. government’s #StopRansomware Guide and addresses the steps organizations can take to boost digital trust. Also covered: why companies must be careful when using open source software. ...


June 16, 2023

Perguntas frequentes sobre vulnerabilidades de transferência do MOVEit e gangue CL0P Ransomware

Frequently asked questions relating to vulnerabilities in MOVEit Transfer, including one that was exploited by the prolific CL0P ransomware gang....


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

A falha Apache Log4j coloca software de terceiros em evidência

Veja os detalhes >