Tenable Cloud Security의 조사에 의하면 설문 조사에 응답한 조직의 무려 95%에서 지난 18개월 동안 클라우드 관련 침해를 겪음
Tenable 2024년 클라우드 보안 전망 조사에서 발견한 사항은 능동적이고 견고한 클라우드 보안이 필요하다는 분명한 신호가 됩니다. Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud infrastruc...
Tenable Bolsters Its Cloud Security Arsenal with Malware Detection
Tenable Cloud Security is enhancing its capabilities with malware detection. Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution. ...
FlowFixation: AWS Apache Airflow 서비스 테이크오버 취약성 및 Guardrails을 무시하면 주요 CSP에 위험이 되는 이유
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of m...
Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable
Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters effortl...
Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment
Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges inv...
Managed Kubernetes: Is It Right for My Organization?
As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your Kubernetes clusters? And should your organization host its Kubernetes deployments or instead choose a manage...
How a Serverless Architecture Can Help You Secure Cloud-Native Applications
Cybersecurity teams often struggle with securing cloud-native applications, which are becoming increasingly popular with developers. The good news is that deploying these applications on a serverless architecture can make it easier to protect them. Here’s why....
주요 도전 과제에 대한 클라우드 리더들의 의견
Too many identities, systems and cooks in the kitchen cloud an already complex mandate....
클라우드 보안 전략 레벨업
Learn how to better your cloud security program with these ten security resolutions. ...
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....
업계 전망: 2024년 주목할 필요가 있는 5개 주요 클라우드 보안 트렌드
생성형 AI가 조직의 사이버 보안 역량을 강화할 것이라는 사실에는 의심의 여지가 없습니다. 하지만, 먼저 탄탄한 사이버 보안 원칙을 적용하지 않는다면 사이버 보안 부서는 생성형 AI로부터 이점을 거의 얻지 못할 것입니다. In this blog, we explain the top cloud security trends that organizations must track – an...
Exfiltrated, Signed, Delivered – What Can Go Wrong When an Amazon Elastic Compute Cloud (EC2) Instance is Exposed to SSRF
Using CNAPPgoat, you can now experiment with a technique that leverages exposure to SSRF to trigger calls to AWS services from within an Amazon EC2 instance. ...