하이브리드 클라우드 보안의 5개 핵심 원칙
How to build a hybrid-cloud security strategy that is effective, scalable and affordable. ...
위험 노출 관리: 플랫폼 접근 방식의 7개 이점
예방적 사이버보안에서는 각 분야에서 최고의 여러 포인트 솔루션의 운영 또는 더 통합된 플랫폼 접근 방식의 사용이 더 효과적인지 오랫동안 논쟁이 있었습니다. Here are seven reasons an exposure management platform can help reduce cyber risk....
EPA에서 공공 상하수도 시스템에 대한 사이버보안 규제를 공표: Tenable이 도움되는 방법
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....
Tenable OT Security의 새로운 기능: 향상된 IT/OT/IoT 자산 검색, 고급 위협 탐지 등
Tenable OT Security, formerly known as Tenable.ot, brings hybrid discovery capabilities and increased visibility for the broadest range of IT and OT devices, making it easier than ever for CISOs to manage security and risk....
멀티클라우드 컴플라이언스의 도전 관제
Organizations that use public clouds like Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) understand that each platform does things its own way, and those differences create challenges for securing them all. In a recent episode of the Tenable Cloud Security Coffee Break we...
멀티클라우드 CSPM에 타사 도구가 적합한 이유
Cloud security posture management enables organizations using multiple public cloud platforms like AWS, Azure and GCP to see everything they have running and where their security risks lie. In a recent episode of the Tenable Cloud Security Coffee Break webinar series, we talked about those challenge...
공공 상하수도 시설에 대한 연방 사이버 보안 권장 사항에 대처: Tenable이 도움되는 방법
Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State Revolving Fund to bolster their cybersecurity defenses. Here’s what you need to know — and how...
Tenable의 EASM 솔루션에서 데이터 및 값을 추출하는 방법
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data....
외부 공격 표면 데이터 분석이 보안 전략을 향상하는 방식
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....
Tenable.sc 6.0: 가시성과 생산성을 높이는 주요 업데이트
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...
Active Directory Vulnerabilities: How Threat Actors Leverage AD Flaws in Ransomware Attacks
Adopting a proactive stance will give enterprises the head start to shut down new threats to Active Directory whenever they are uncovered....
Tenable.io: To control or not to control, that is the question
For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to im...