공공 상하수도 시설에 대한 연방 사이버 보안 권장 사항에 대처: Tenable이 도움되는 방법
Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and how...
Cyber Watch: NIST의 AI 위험 프레임워크 소개, 사기에서 직원 보호, 비즈니스 부서와 대화하는 방법 등
Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for protecting your employees from money-transfer scams. Learning to secure AI? Curious to know how ...
사이버 보안 스냅샷: ChatGPT와 제약 없는 인터뷰 보기
We pulled no punches in our question-and-answer session with ChatGPT: Find out what the world’s most famous AI chatbot had to say. Plus, CISA and the FBI offer help in dealing with a massive ransomware campaign. Also, are CIOs becoming de-facto CISOs? And cyber attackers are aiming at finance and ac...
How to Implement CIEM – A Checklist
What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out....
Tenable의 EASM 솔루션에서 데이터 및 값을 추출하는 방법
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data....
Tenable Cyber Watch: IoT 공급업체들이 취약성 공개가 부족, 사이버가 여전히 비즈니스 우려 사항에서 최고 순위, GAO에서 연방 기관이 사이버 보안 권고를 주의하지 않음에 대해 실망
This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the GAO's frustrations with federal agencies not heeding their cybersecurity advice and provides guidan...
사이버 보안 스냅샷: ChatGPT 열풍 중에 NIST에서 AI 보안 가이드라인을 발표
Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!...
지금은 미국 정부가 아프리카의 사이버 보안의 향상을 지원할 시기
African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. ...
How Attackers Can Exploit GCP’s Multicloud Workload Solution
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations....
ProxyNotShell, OWASSRF, TabShell: 곧 바로 Microsoft Exchange Servers를 패치하십시오
Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended....
Tenable Cyber Watch: CISO의 자신들의 직업에 대한 생각, 개발 팀에게 보안이 어려운 이유, AI를 사용하여 위험 줄이기
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back. Ever wonder how happy your CISO is at ...
Sandworm APT에서 Active Directory 그룹 정책을 사용하는 새로운 SwiftSlicer Wiper를 배포
Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer....