Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

August 4, 2025

How Exposure Management Moves Beyond Vulnerability Scans to A Unified View of Risk

Todas as segundas-feiras, a Tenable Exposure Management Academy fornece a orientação prática e real de que você precisa para mudar do gerenciamento de vulnerabilidades para o gerenciamento de exposição. In this post, we look at the results of a survey taken during a recent Tenable webinar on the level of familiarity with exposure management.

March 13, 2023

Tenable Cyber Watch: Tenable’s 2022 Threat Landscape Report, Top Cyber Risks for 2023, and A Salary Boost for Cyber Architects and Engineers

This week’s edition of Tenable Cyber Watch unpacks the top eight cybersecurity risks organizations face in 2023. Plus, we talk about the continued threat of unpatched, known vulnerabilities that are still being exploited by threat actors. Finally, we look at a new study that shows salaries are incre...


March 10, 2023

Cybersecurity Snapshot: Find MITRE ATT&CK Complex? Need Help Mapping to It? There’s an App for That!

Learn about a new tool that streamlines MITRE ATT&CK mapping. Plus, known vulnerabilities remain a major cyber risk – just ask LastPass. Also, discover why SaaS data protection remains difficult. Plus, a look at the U.S. National Cybersecurity Strategy. And much more!...


March 9, 2023

A New Incentive for Using AWS VPC Endpoints

If you haven’t been using VPC endpoints until now, AWS' two new condition keys should make you consider doing so....


March 9, 2023

O que há de novo na segurança de OT da Tenable: Descoberta superior de ativos de TI/OT/IoT, detecção avançada de ameaças e muito mais

Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk....


March 9, 2023

Os desafios da conformidade em várias nuvens

As organizações que usam nuvens públicas, como Amazon Web Services (AWS), Microsoft Azure e Google Cloud Platform (GCP), entendem que cada plataforma faz as coisas à sua maneira e, com essas diferenças, surgem desafios para proteger todas. In a recent episode of the Tenable Cloud Security Coffee Break we...


March 8, 2023

Managing Cloud Compliance and Security Posture with Cloud Compliance Tools

Why compliance and access security in the public cloud are so challenging – and how carefully-chosen CSPM tools can help....


March 6, 2023

Tenable Cyber Watch: Como proteger a infraestrutura crítica cibernética, os invasores ganham vantagem em comprometimentos de dados e muito mais

This week’s edition of the Tenable Cyber Watch unpacks the challenges in protecting cyber critical infrastructure and addresses cyberthieves gaining the upper hand in data compromises. Also covered: Why organizations should brace themselves for more cyberattacks targeting accounting and financial da...


March 3, 2023

O FBI e a CISA lançaram um comunicado sobre segurança cibernética relacionado ao Royal Ransomware Group

The FBI and CISA have released a joint Cybersecurity Advisory discussing the Royal ransomware group....


March 3, 2023

Cybersecurity Snapshot: A ChatGPT Special Edition About What Matters Most to Cyber Pros

Since ChatGPT’s release in November, the world has seemingly been on an “all day, every day” discussion about the generative AI chatbot’s impressive skills, evident limitations and potential to be used for good and evil. In this special edition, we highlight six things about ChatGPT that matter righ...


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.

Análise do ecossistema de ransomware

Fazer download do relatório >