Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

March 28, 2023

Gerenciamento de exposição: sete benefícios de uma abordagem de plataforma

Quando se trata de segurança cibernética preventiva, ainda não se chegou a um consenso se é mais eficaz operar uma variedade das melhores soluções pontuais ou adotar uma abordagem de plataforma mais consolidada. Here are seven reasons an exposure management platform can help reduce cyber risk....


March 27, 2023

EPA emite regulamentos de segurança cibernética para sistemas públicos de água: como a Tenable pode ajudar

EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....


March 27, 2023

Tenable Cyber Watch: U.K. Cyber Agency Raises Privacy Concerns About ChatGPT, CISA Program Tackles Ransomware in Critical Infrastructure, and more

This week’s edition of the Tenable Cyber Watch unpacks CISA’s new pilot program that detects vulnerabilities in critical infrastructure and addresses the FBI’s plea for more ransomware victims to report attacks. Also covered: Why the U.K. National Cyber Security Centre is warning ChatGPT users to tr...


March 27, 2023

Federating Kubernetes Workloads with Cloud Identities

Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely....


March 24, 2023

Cybersecurity Snapshot: Fortaleça a segurança do gerenciamento de identidade e acesso com as novas práticas recomendadas da CISA/NSA

Learn about a new guide packed with best practices recommendations to improve IAM systems security. Plus, cybersecurity ranks as top criteria for software buyers. Also, guess who’s also worried about ChatGPT? Oh, and do you know what a BISO is? And much more! ...


March 22, 2023

Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important

Segregation in cloud environments is important for security — this post explores why and offers best practice tips for acting on it....


March 20, 2023

Tenable Cyber Watch: A Look at the U.S. National Cybersecurity Strategy, A Powerful AI Tech Gears Up for Prime Time, and more

This week’s edition of the Tenable Cyber Watch unpacks the White House’s National Cybersecurity Strategy and explores how artificial intelligence will help cyber teams with complex attacks. Also covered: Why software vendors should prepare to submit letters of attestation to the GSA. ...


March 17, 2023

OpenAI’s ChatGPT and GPT-4 Used as Lure in Phishing Email, Twitter Scams to Promote Fake OpenAI Tokens

Hoping to cash in on the massive interest around OpenAI’s GPT-4 – ChatGPT’s new multimodal model – scammers have launched phishing campaigns via email and Twitter designed to steal cryptocurrency. Check out how they’re carrying out the scams and how you can avoid becoming a victim....


March 17, 2023

Cybersecurity Snapshot: CISA Pinpoints Vulnerabilities in Critical Infrastructure Orgs that Ransomware Groups Could Exploit

Learn about CISA’s new program to help critical infrastructure organizations stamp out vulnerabilities associated with ransomware attacks. Plus, a U.S. government advisory with the latest on LockBit 3.0. Also, find out why the U.K.’s cyber agency is warning users about ChatGPT. And much more! ...


March 14, 2023

O patch de terça-feira de março de 2023 da Microsoft aborda 76 CVEs

Microsoft addresses 76 CVEs including two zero-days exploited in the wild, one of which was publicly disclosed....


March 13, 2023

Tenable Cyber Watch: Tenable’s 2022 Threat Landscape Report, Top Cyber Risks for 2023, and A Salary Boost for Cyber Architects and Engineers

This week’s edition of Tenable Cyber Watch unpacks the top eight cybersecurity risks organizations face in 2023. Plus, we talk about the continued threat of unpatched, known vulnerabilities that are still being exploited by threat actors. Finally, we look at a new study that shows salaries are incre...


March 10, 2023

Cybersecurity Snapshot: Find MITRE ATT&CK Complex? Need Help Mapping to It? There’s an App for That!

Learn about a new tool that streamlines MITRE ATT&CK mapping. Plus, known vulnerabilities remain a major cyber risk – just ask LastPass. Also, discover why SaaS data protection remains difficult. Plus, a look at the U.S. National Cybersecurity Strategy. And much more!...


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

A falha Apache Log4j coloca software de terceiros em evidência

Veja os detalhes >