OT 해양 보안: 전방에 거친 바다 또는 순조로운 항해?
해운 산업은 사이버 보안 환경이 끊임없이 변화하는 바다를 항해하고 있습니다. 서로 연결된 선박과 신기술은 해운 업계의 효율성을 더욱 높여주지만 동시에 사이버 위험을 초래하기도 합니다. Here's what you need to know about the challenges and risks these floating cities face —...
위험 노출 관리가 침투 테스트를 더 효과적으로 만들 수 있는 방법
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....
생산 시설에서 위험을 줄이는 실질적 방법
제조업 생산 시설의 사이버 보안에 대한 많은 관심이 있지만 무엇부터 시작해야 합니까? 간단하게 공격자들이 공격하는 이유와 이들을 막기 위해 할 수 있는 것에 대해서 생각해보겠습니다. 이 모든 것은 위험을 줄이고 최고의 결과를 얻기 위해 노력을 최대화하는 것입니다. Read on to learn mor...
Tenable Announces Support for Microsoft Azure Linux: A New Way to Achieve Secure Container Development
With the launch of Azure Linux container host for Azure Kubernetes Service, Microsoft enters the open-source Linux distribution container sphere with enhanced security Kubernetes experience. In this blog, we explain key features of Azure Linux and how Tenable can support the security needs of Micros...
How Tenable Identity Exposure Helps You Adopt CISA's Latest Zero Trust Guidelines
Active Directory provides an essential foundation for zero trust architectures, so protecting it is critical. With Tenable Identity Exposure, you can continually assess the hygiene and security posture of your Active Directory system, reducing the risk of breaches. Here’s how....
Tenable 제품 이름 변경과 Tenable 브랜드의 진화
Tenable is changing its products’ names to make them more descriptive, so that it’s easier for people to understand our portfolio and the capabilities we offer. ...
The Role of Open Source in Cloud Security: A Case Study with Terrascan by Tenable
Open source software and cloud-native infrastructure are inextricably linked and can play a key role in helping to manage security. Open source security tools like Terrascan by Tenable are easy to scale, cost-effective and benefit from an agile community of contributors. Let’s take a look at how you...
Tenable Security Center를 통합한 Tenable One은 온프레미스 고객에게 완벽한 위험 노출 관리 기능을 제공
With the integration of Tenable Security Center into Tenable One, Tenable becomes the only vendor to offer exposure management for both on-premises and hybrid deployment models. Here’s what you need to know. ...
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how....
전체 상태 사이버 보안 접근 방식으로 지역 정부 기관 보호
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...
Agents vs. Agentless: 퍼블릭 클라우드 환경에 어떤 솔루션이 적합합니까?
You can scan cloud systems for security problems in multiple ways depending on what your instances are running, how long they’re up and whether or not they can run an agent or be accessed with administrative credentials. Network scanning, installed agents, or public cloud APIs can all report finding...
TSA, FAA 요구 사항이 공항 및 공항 운영자 및 공항 터미널 프로젝트에 대한 사이버 보안을 강조: Tenable이 도움되는 방법
The TSA and FAA are making cybersecurity a priority for airport and aircraft operators and for airport terminal projects to prevent disruption and degradation to their infrastructure. Here's what you need to know — and how Tenable can help....