Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

May 9, 2023

간격에 주의: 2022년에 공개된 취약성 자세히 알아보

This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable ca...


May 9, 2023

간격에 주의: 2022년의 주목할만한 8개 CVE 자세히 알아보기

This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss how...


May 8, 2023

Tenable Cyber Watch: 거의 50%의 근로자가 이전 채용 기업의 계정에 액세스한 적이 있음, 바이든 대통령이 AI 책임에 대한 의견을 희망, 등

This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. Also covered: Businesses must improve password management: a new study reveals nearly 50% of ex-employees have ...


May 5, 2023

사이버 보안 스냅샷: CSA에서 조직에서 ChatGPT를 안전하게 사용하는 가이드라인 제공

Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. And much more! ...


May 4, 2023

Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad

Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions....


May 3, 2023

Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure

Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how....


May 2, 2023

전체 상태 사이버 보안 접근 방식으로 지역 정부 기관 보호

Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...


May 1, 2023

Tenable Cyber Watch: RSA 컨퍼런스에서 3개 반드시 기억할 사항, 삼성 직원이 ChatGPT에 민감한 데이터를 유출 등

This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry. ...


April 28, 2023

사이버 보안 스냅샷: RSA 컨퍼런스 스페셜 에디션 및 뷔페식 AI 및 ChatGPT

Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!...


April 26, 2023

IDC Ranks Tenable No. 1 in Worldwide Device Vulnerability Management Market Share for the Fourth Consecutive Year

The research firm's latest report also provides market insights security professionals can use to improve their vulnerability management strategy....


April 25, 2023

Kubernetes 보안을 향상하는 방법: 지금 구현해야 하는 4개의 모범 사례

How to ensure the right configurations and policies are in place to keep your cloud environments secure....


April 25, 2023

보안 리더가 보안 제품 수명 종료에 대해 알아야할 사항: Tenable이 시장을 선도하는 방식

Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers....


도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >