Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

October 30, 2023

인력, 프로세스 및 기술 도전 과제가 사이버 보안 팀을 방해하는 방식

In a commissioned study conducted in 2023 by Forrester Consulting on behalf of Tenable, we set out to understand the real-world challenges standing in the way of effective risk-reduction practices. Here’s what we learned. ...


October 30, 2023

Tenable Cyber Watch: IAM이 수요가 많은 사이버 기술 순위에서 1위, 피싱 방지 모범 사례 등

This week's edition of Tenable Cyber Watch unpacks the most sought-after cyber skills and addresses how to protect your organization from phishing attacks. Also covered: The most common method used to log into online accounts. ...


October 27, 2023

CVE-2023-46747: F5 BIG-IP에 중요 인증 바이패스 취약성

A critical authentication bypass vulnerability in F5’s BIG-IP could allow remote, unauthenticated attackers to execute system commands. Organizations are encouraged to apply patches as soon as possible....


October 27, 2023

사이버 보안 스냅샷: GenAI가 사이버 보안에서 폭넓은 인공 지능의 사용을 추진

Check out how organizations’ enthusiasm over generative AI is fueling artificial intelligence adoption for cybersecurity. Plus, how CISA plans to revamp the U.S. government’s cyber incident response plan. In addition, learn about a new set of best practices for protecting cloud backups. Also, why bo...


October 23, 2023

Study: Tenable에서 가장 빠르고 폭넓은 CISA의 KEV 카탈로그 보안 범위를 제공

Tenable ranked first in multiple vulnerability management categories, including the most comprehensive coverage and quickest detection of CISA's Known Exploited Vulnerabilities, according to a Miercom report commissioned by Tenable....


October 23, 2023

Tenable Cyber Watch: 미국 및 일본에서 중국의 ‘BlackTech’ 공격자에 대해 경고, CISA에서 새로운 HBOM 프레임워크 공개 등

This week’s edition of Tenable Cyber Watch unpacks BlackTech, the hackers linked to the Chinese government who are stealthily compromising network devices. We also cover two CISA initiatives: A new HBOM framework for hardware supply chain risk and an updated reference architecture for identity secur...


October 20, 2023

사이버 보안 스냅샷: 사이버 팀에서 방어를 향상하기 위해 통합된 제품군 GenAI를 도입 

Cyber leaders are embracing generative AI and product suites, while ditching siloed tools. Plus, check out a guide packed with anti-phishing tips, and another one full of IAM security best practices. Also, discover the skills that cybersecurity recruiters value the most. And much more!...


October 19, 2023

CISA와 NSA에서 상위 10개 사이버 보안 구성 오류에 관해 공개: Tenable이 도움되는 방법

The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....


October 18, 2023

Oracle의 October 2023 중요 패치 업데이트로 176개 CVE를 해결

Oracle addresses 176 CVEs in its fourth quarterly update of 2023 with 387 patches, including 46 critical updates....


October 18, 2023

CVE-2023-4966: Citrix NetScaler ADC 및 NetScaler Gateway 정보 공개가 널리 악용됨

A critical information disclosure vulnerability in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway has been exploited in the wild as a zero-day vulnerability. Organizations are urged to patch immediately....


October 17, 2023

Tenable Cyber Watch: SANS에서 OT 보안 예산 최대화에 대해 조언, 사이버 보안 인식의 달

This week’s edition of Tenable Cyber Watch unpacks how to maximize shrinking OT security budgets and addresses why CISA is calling on tech vendors to do better as a part of its cybersecurity awareness campaign. Also covered: Ermetic’s new open source tool that helps you assess multi-cloud security. ...


October 17, 2023

통합된 IT 및 웹 앱 보안: Security Center에 통합된 온프레미스 웹 앱 스캐닝

이제 Tenable Security Center 내에서 온프레미스 웹 앱 스캐닝을 사용할 수 있으며 정확한 분석, OWASP 상위 10개 보안 범위 및 손쉬운 설정을 통해 포괄적인 위험 노출 관리를 제공합니다. Here’s what you need to know....


도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >