Tenable 블로그
사이버 보안 스냅샷: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Introducing Tenable Cloud Security with Agentless Assessment and Live Results
Tenable’s latest cloud security enhancements unify cloud security posture and vulnerability management with new, 100% API-driven scanning and zero-day detection capabilities....
3 Ways to Reduce the Risk from Misused AWS IAM User Access Keys
Used incorrectly, AWS IAM user access keys can pose high risk; the good news is that great alternatives, explored here, exist....
Microsoft’s August 2022 Patch Tuesday Addresses 118 CVEs (CVE-2022-34713)
Microsoft addresses 118 CVEs in its August 2022 Patch Tuesday release, including 17 critical flaws....
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Aug. 5 | Don’t take your eye off the Log4j ball. The dangers of unsupported software. Why low MFA adoption is everyone’s problem. Preventing ransomware attacks. And much more!...
Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021
International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. We identified vulnerabilities associated with these strains....
CVE-2022-31656: VMware Patches Several Vulnerabilities in Multiple Products (VMSA-2022-0021)
VMware has patched another set of serious vulnerabilities across multiple products including VMware Workspace ONE Access. Organizations should patch urgently given past activity targeting vulnerabilities in VMware products....
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending July 29 | Boost your security awareness program. Why fire drills hurt security teams. A quick temperature check on attack surface management. Protecting smart factories from cyberattacks. And much more!...
3 Types of Cyber Attackers: Which Organizations Do They Target?
Is an attacker interested in your organization? Probably. Deconstructing the PoV of cyberattackers is key to defending your turf....
랜섬웨어 에코시스템: 부와 명성 추구
The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune....