Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog da Tenable

February 20, 2026

Dynamic Objects in Active Directory: The Stealthy Threat

Active Directory’s "dynamic objects" feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze.

May 4, 2023

Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad

Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions.


May 3, 2023

Apresentamos a avaliação sem agente do Tenable Cloud Security para o Microsoft Azure

Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.


May 2, 2023

Como proteger agências governamentais locais com uma abordagem de segurança Whole-of-State

Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…


May 1, 2023

Tenable Cyber Watch: 3 Hot Takes from RSA Conference, Samsung Employees Leak Sensitive Data to ChatGPT, and more

This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry.


April 28, 2023

Cybersecurity Snapshot: RSA Conference Special Edition with All-You-Can-Eat AI and ChatGPT

Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!


April 26, 2023

A IDC classifica a Tenable como a número 1 em participação no mercado mundial de gerenciamento de vulnerabilidades de dispositivos pelo quarto ano consecutivo

O último relatório da empresa de pesquisa também fornece insights de mercado que os profissionais de segurança podem usar para melhorar sua estratégia de gerenciamento de vulnerabilidades.


25 de abril de 2023

How to Improve Kubernetes Security: Four Best Practices to Implement Today

How to ensure the right configurations and policies are in place to keep your cloud environments secure.


25 de abril de 2023

What Security Leaders Need to Know About Security End of Life: How Tenable is Leading the Way

Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers.


April 24, 2023

‘K’ is for ‘Komplex’: Key Kubernetes Considerations for Security Teams

The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s…


As notícias de segurança cibernética mais relevantes

Informe seu e-mail e nunca mais perca os alertas atuais e orientações de segurança dos especialistas da Tenable.