Tenable Cyber Watch: 미국 및 일본에서 중국의 ‘BlackTech’ 공격자에 대해 경고, CISA에서 새로운 HBOM 프레임워크 공개 등
This week’s edition of Tenable Cyber Watch unpacks BlackTech, the hackers linked to the Chinese government who are stealthily compromising network devices. We also cover two CISA initiatives: A new HBOM framework for hardware supply chain risk and an updated reference architecture for identity secur...
사이버 보안 스냅샷: 사이버 팀에서 방어를 향상하기 위해 통합된 제품군 GenAI를 도입
Cyber leaders are embracing generative AI and product suites, while ditching siloed tools. Plus, check out a guide packed with anti-phishing tips, and another one full of IAM security best practices. Also, discover the skills that cybersecurity recruiters value the most. And much more!...
CISA와 NSA에서 상위 10개 사이버 보안 구성 오류에 관해 공개: Tenable이 도움되는 방법
The NSA and CISA have released a joint cybersecurity advisory discussing the top 10 most common cybersecurity misconfigurations, and outlining ways to mitigate them. Read this blog to learn more and see how Tenable technologies can help discover, prevent and remediate these misconfigurations....
Tenable Cyber Watch: SANS에서 OT 보안 예산 최대화에 대해 조언, 사이버 보안 인식의 달
This week’s edition of Tenable Cyber Watch unpacks how to maximize shrinking OT security budgets and addresses why CISA is calling on tech vendors to do better as a part of its cybersecurity awareness campaign. Also covered: Ermetic’s new open source tool that helps you assess multi-cloud security. ...
사이버 보안 스냅샷: SANS에서 더 적은 보안 예산의 활용을 최대화하는 팁을 제공
A SANS Institute survey found that budgets for ICS/OT security have shrunk, and advises on how to do more with less. Plus, hiring managers boost starting salaries to recruit stellar cyber pros. In addition, CISA’s Cybersecurity Awareness Month campaign challenges tech vendors to build safer products...
2023년 회계 연도 미국주 및 지역 사이버 보안 지원 프로그램 목표
This is the first of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP. In 2021, the U.S. Infrastructure Investment and Jobs Act created the State and Local Cybersecurity Grant Program (SLCGP) to he...
새로운 미국의 SLCGP 사이버 보안 계획 요구 사항: CISA의 CPG를 사용하여 사이버 보안 모범 사례를 채용
This is the second of a two-part series exploring how Tenable One can help state, local, tribal and territorial (SLTT) agencies meet the goals and objectives of the SLCGP....
Tenable Cyber Watch: 사이버 공격으로 보험 청구가 증가하면서 DHS에서 새 랜섬웨어 추세를 추적
This week’s edition of Tenable Cyber Watch unpacks new ransomware trends spotted by the U.S. Department of Homeland Security and addresses the surge in cyber insurance claims due to ransomware attacks. Also covered: A look into Snatch. Why is CISA warning critical infrastructure organizations about ...
사이버 보안 스냅샷: 사이버 위협이 심해지면서 CISO는 예산의 부족으로 어려움
After double-digit growth in the past two years, cybersecurity budgets expanded more modestly in 2023. Plus, a survey offers an inside look at how organizations are grappling with cyber challenges. In addition, the U.S. and Japan warn about a China-linked group that’s stealthily compromising network...
Tenable Cyber Watch: 미국에서 딥페이크 위협에 대한 권고, AI 시스템 보안 유지에 대한 모범 사례 등
This week’s edition of Tenable Cyber Watch unpacks preparing for deepfake threats and addresses CISA’s roadmap for open source security. Also covered: tips and best practices for securing AI systems. Why is the U.S. government urging organizations to prepare for deepfake threats? Curious to know ...
사이버 보안 스냅샷: 공격으로 인해 사이버 보험 클레임이 증가하고 Snatch 변종이 경고를 작동함에 따라 DHS에서 새 랜섬웨어 트렌드를 추적
Check out the new ransomware trends documented by DHS, as well as a joint CISA-FBI alert about the Snatch ransomware. Plus, find out what CISA has in store for its Known Exploited Vulnerabilities catalog. Furthermore, don’t miss new source-code management tips from the OpenSSF. And much more!...
Tenable Cyber Watch: 미국 우주 산업에 경계심을 유지하도록 권고, 사이버 직장에 어려움 등
This week’s edition of Tenable Cyber Watch unpacks safeguarding the US space industry and addresses why many cyber pros feel their jobs have gotten more difficult. Also covered: Three quantum-resistant algorithms that can protect data from quantum computer attacks....