Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

July 14, 2023

Cybersecurity Snapshot: CISA and NSA Dive into CI/CD Security, While MITRE Ranks Top Software Weaknesses

Learn about the guidance from the U.S. government for defending CI/CD pipelines. Plus, check out the 25 most dangerous software weaknesses. Also, what developers like about AI tools – and what they don’t. e muito mais.


July 12, 2023

CVE-2023-3595, CVE-2023-3596: Vulnerabilidades Rockwell Automation ControlLogix divulgadas

Rockwell Automation issues advisory for multiple vulnerabilities, including a critical flaw that could lead to disruption or destruction of critical infrastructure processes.


July 12, 2023

Finding Rockwell Automation Allen-Bradley Communication Modules Affected by CVE-2023-3595 and CVE-2023-3596 in OT Environments

Identifying vulnerable systems in your industrial environment can be complex. Use the wrong tool and it will overlook affected devices. Find out how Tenable OT Security is designed to give you in-depth asset visibility to address these new vulnerabilities without disrupting productivity.


July 11, 2023

A Patch Tuesday da Microsoft de julho de 2023 aborda 130 CVEs (CVE-2023-36884)

Microsoft addresses 130 CVEs including five that were exploited in the wild as zero-day vulnerabilities and guidance on the malicious use of Microsoft signed drivers.


July 10, 2023

Tenable Cyber Watch: Study Finds Many CISOs Are Unqualified to Serve on Boards, How Cybersecurity Boosts Business, and more

This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards.


July 7, 2023

Cybersecurity Snapshot: ChatGPT-like Tools Will Boost Developers’ Speed – and Amplify Cyber Risk

Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? e muito mais.


July 4, 2023

An Unexpected Implication of Lambda Privileges

Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance.


July 3, 2023

Tenable Cyber Watch: Feds Offer $10 Million Reward for CL0P Info, Best Practices for Ransomware Incident Response, and more

This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure…


June 30, 2023

Cybersecurity Snapshot: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill 

Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. e muito mais.


June 29, 2023

The Default Toxic Combination of GCP Compute Engine Instances

By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix.


June 29, 2023

Segurança de OT no setor marítimo: tempestade à frente ou içar velas?

O setor marítimo está navegando em um mar de mudanças quando falamos em segurança cibernética. As embarcações interconectadas e as novas tecnologias que permitem que o mundo da navegação se torne mais eficiente também introduzem o risco cibernético. Here's what you need to know about the challenges and risks these floating cities face …


June 28, 2023

How Exposure Management Can Make Pen Testing More Effective

Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

A falha Apache Log4j coloca software de terceiros em evidência

Veja os detalhes >

× Contact our sales team