Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

May 12, 2023

Cybersecurity Snapshot: Como aumentar a confiança dos clientes nos seus serviços digitais

Check out how beefing up digital trust in your technology yields key business benefits. Plus, a sophisticated cyber espionage operation has been defused. Also, why cyberattack victims should speak up. In addition, don’t miss our poll on mobile device security. e muito mais.


May 11, 2023

O papel do código aberto na segurança na nuvem:Um estudo de caso com Terrascan, oferecido pela Tenable

Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how…


May 9, 2023

Patch Tuesday de Maio de 2023 da Microsoft lista 38 CVEs (CVE-2023-29336)

Microsoft addresses 38 CVEs including three zero-day vulnerabilities, two of which were exploited in the wild.


May 9, 2023

A integração do Tenable Security Center com o Tenable One oferece gerenciamento de exposição total para clientes no local

Com a integração do Tenable Security Center ao Tenable One, a Tenable se torna o único fornecedor a oferecer gerenciamento de exposição para modelos de implementação locais e híbridos. Eis o que você precisa saber.


May 9, 2023

Tome cuidado: Como esperar por NVD coloca a sua organização em risco

This is the first of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. We explore the impact of that gap on an organization’s cyber risk and discuss how Tenable can help.


May 9, 2023

Tome cuidado: Como as estruturas de vulnerabilidade existentes podem deixar a organização exposta

This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and…


May 9, 2023

Tome cuidado: A Closer Look at the Vulnerabilities Disclosed in 2022

This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable…


May 9, 2023

Tome cuidado: A Closer Look at Eight Notable CVEs from 2022

This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss…


May 8, 2023

Tenable Cyber Watch: Nearly 50% of Workers Have Accessed Ex-Employers’ Accounts, Biden Seeks Your Input on AI Accountability, and more

This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have…


May 5, 2023

Cybersecurity Snapshot: CSA Offers Guidance on How To Use ChatGPT Securely in Your Org

Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. e muito mais.


May 4, 2023

Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad

Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions.


May 3, 2023

Apresentamos a avaliação sem agente do Tenable Cloud Security para o Microsoft Azure

Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.