사이버 보안 스냅샷: CSA에서 조직에서 ChatGPT를 안전하게 사용하는 가이드라인 제공
Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. And much more! ...
Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad
Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions....
Introducing Tenable Cloud Security Agentless Assessment for Microsoft Azure
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how....
전체 상태 사이버 보안 접근 방식으로 지역 정부 기관 보호
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...
Tenable Cyber Watch: RSA 컨퍼런스에서 3개 반드시 기억할 사항, 삼성 직원이 ChatGPT에 민감한 데이터를 유출 등
This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry. ...
사이버 보안 스냅샷: RSA 컨퍼런스 스페셜 에디션 및 뷔페식 AI 및 ChatGPT
Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!...
IDC Ranks Tenable No. 1 in Worldwide Device Vulnerability Management Market Share for the Fourth Consecutive Year
The research firm's latest report also provides market insights security professionals can use to improve their vulnerability management strategy....
Kubernetes 보안을 향상하는 방법: 지금 구현해야 하는 4개의 모범 사례
How to ensure the right configurations and policies are in place to keep your cloud environments secure....
보안 리더가 보안 제품 수명 종료에 대해 알아야할 사항: Tenable이 시장을 선도하는 방식
Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers....
‘K’ is for ‘Komplex’: Key Kubernetes Considerations for Security Teams
The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s w...
Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume
How to do CWP right to prepare your organization and protect it from the next widespread vulnerability. ...
Tenable Cyber Watch: 다크웹 마켓플레이스 Genesis Market 폐쇄, ChatGPT의 사용이 데이터 개인정보보호 규정을 위반할 수 있는 방식 등
This week’s edition of the Tenable Cyber Watch unpacks the international sting operation that successfully shut down notorious cybercrime marketplace Genesis Market and explores how using ChatGPT can breach data privacy rules. Also covered: Why the cybersecurity term “BISO” is getting all the buzz. ...