Tenable 블로그
가트너®, 2025년 보고서에서 AI 기반 노출 평가 분야에서 현재 가장 주목해야 할 기업으로 Tenable 선정
CVE-2025-0282: Ivanti Connect Secure 제로데이 취약성이 널리 악용됨
Ivanti disclosed two vulnerabilities in its Connect Secure, Policy Secure and Neurons for ZTA gateway devices, including one flaw that was exploited in the wild as a zero-day.
Tenable Chairman and CEO Amit Yoran Has Died
It is with profound sadness that we share the news of the passing of our beloved CEO Amit Yoran on January 3. Amit was not only a visionary leader but also a guiding force who profoundly impacted our industry, our company, our culture and our community.
사이버 보안 스냅샷: After Telecom Hacks, CISA Offers Security Tips for Cell Phone Users, While Banks Seek Clearer AI Regulations
Check out best practices for preventing mobile communications hacking. Plus, how the U.S. government can improve financial firms’ AI use. Meanwhile, the FBI warns about a campaign to hack vulnerable webcams and DVRs. And get the latest on a Chinese APT’s hack of the Treasury Department; the federal…
적합한 CNAPP 선택하기: 중간 규모의 엔터프라이즈를 위한 6개 고려 사항
Mid-sized enterprises increasingly find themselves in need of a CNAPP, as their cloud adoption matures. But how should they go about selecting the right one? What questions should they ask and what criteria should they use? Here we unpack six key considerations that’ll help them evaluate their…
SEC의 사이버 보안 공개 규칙에 대해 알아보기: 1년 후에
In December 2023, as cyberattacks surged, the U.S. Securities and Exchange Commission (SEC) began enforcing new cybersecurity disclosure rules. This pushed C-level executives and boards to adopt measures for compliance and transparency. In this post, we look at the enforcement actions the SEC has…
사이버 보안 스냅샷: 사이버 보안 산업에 나타나는 조짐은 무엇입니까? Tenable 전문가의 2025년에 대한 전망
Wondering what cybersecurity trends will have the most impact in 2025? Check out six predictions from Tenable experts about cyber issues that should be on your radar screen in the new year — including AI security, data protection, cloud security … and much more!
사이버 보안 스냅샷: CISA Hands Down Cloud Security Directive, While Threat from North Korean IT Workers Gets the Spotlight
Check out the new cloud security requirements for federal agencies. Plus, beware of North Korean government operatives posing as remote IT pros. Also, learn how water plants can protect their HMIs against cyberattacks. And get the latest on the U.S. cyber incident response framework; the CIS…
Web App Scanning 101: What Security Pros Need to Know About CI/CD Pipelines
Git, repositories and pipelines…oh my! We unpack standard practices in the web app development process and provide guidance on how to use Tenable Web Application Scanning to secure your code.
What You Must Know About the OWASP Top 10 for LLM Applications 2025 update
As GenAI becomes a vital part of business operations, the risks it brings are evolving just as fast. Here are four key takeaways from the latest OWASP LLM guidance.