Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

August 1, 2025

사이버 보안 스냅샷: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

October 11, 2022

CISOs Tell All: Everything You’ve Ever Wanted To Know About CISOs in 2022

You’ve got questions and they’ve got answers. A global survey provides a snapshot of what it’s like to sit in the CISO chair, as these cybersecurity leaders face increasingly sophisticated cyber threats and heightened expectations from their organizations.  They're questions that most cybers...


October 10, 2022

Tenable.io: To control or not to control, that is the question

For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to im...


October 7, 2022

Top 20 CVEs Exploited by People's Republic of China State-Sponsored Actors (AA22-279A)

CISA, the NSA and FBI issue a joint advisory detailing the top 20 vulnerabilities exploited by state-sponsored threat actors linked to the People’s Republic of China....


October 7, 2022

CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy

Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access....


October 7, 2022

사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항

Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Not great | New malware cracks monthly top 10 list | And much more!...


October 6, 2022

Public Network Access to Azure Resources Is Too Easy to Configure

For some types of Microsoft Azure resources and subnets, it’s extremely easy to configure what is essentially public network access. We describe here some examples and how to reduce such risks....


2022년 10월 4일

Tenable One - 위험 노출 관리 플랫폼 소개

발생 가능한 공격을 예상하고 선제적으로 노출을 줄이십시오. Communicate with your key stakeholders....


2022년 10월 4일

위험 노출 관리: 최신 공격 표면의 위험 감소

사이버 보안 조직은 파편화된 수많은 데이터를 생성하지만 인사이트는 거의 없는 사후대응적이고 사일로화된 보안 프로그램과 포인트 도구의 무분별한 확장으로 인해 어려움을 겪고 있습니다. Here we explain why they need an exposure management platform that provides comprehensive visibility and allows them to anticipate...


September 30, 2022

CVE-2022-41040 and CVE-2022-41082: ProxyShell Variant Exploited in the Wild

Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available....


도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

랜섬웨어 에코시스템 들여다보기

보고서 다운로드 >