Tenable 블로그
How Tenable One Helps Canadian Orgs Set Up Exposure Management Programs and Meet Compliance Demands

더 나은 이상 탐지 및 인시던트 대응을 위해 내부 로그를 활용
Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks....
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....
191개 CVE를 다루는 Oracle January 2024 중요 패치 업데이트
Oracle addresses 191 CVEs in its first quarterly update of 2024 with 389 patches, including 37 critical updates....
CVE-2023-6548, CVE-2023-6549: Citrix NetScaler ADC 및 NetScaler Gateway에서 제로데이 취약성이 악용됨
Two zero-day vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have been exploited in the wild. Urgent patching is required to address these flaws....
업계 전망: 2024년 주목할 필요가 있는 5개 주요 클라우드 보안 트렌드
생성형 AI가 조직의 사이버 보안 역량을 강화할 것이라는 사실에는 의심의 여지가 없습니다. 하지만, 먼저 탄탄한 사이버 보안 원칙을 적용하지 않는다면 사이버 보안 부서는 생성형 AI로부터 이점을 거의 얻지 못할 것입니다. In this blog, we explain the top cloud security trends that organizations must track – an...
사이버 보안 스냅샷: How To Boost the Cybersecurity of AI Systems While Minimizing Risks
Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and h...
CVE-2023-46805, CVE-2024-21887: Ivanti Connect Secure 및 Policy Secure Gateways에서 제로데이 취약성 악용됨
Two zero-day vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure have been exploited in the wild, with at least one attack attributed to nation-state actors....
Microsoft의 January 2024 Patch Tuesday에서 48개 CVE를(CVE-2024-20674) 처리
Microsoft addresses 48 CVEs in its January 2024 Patch Tuesday release with no zero-day or publicly disclosed vulnerabilities....
복원력이 높은 OT 환경 구축: 전력 시설의 보안
Recent cyberattacks on critical infrastructure demonstrate how hackers can take advantage of industrial control systems. Organizations that adopt the latest vulnerability management best practices will be best prepared to reduce risk and mitigate possible damage....