Tenable 블로그
가트너®, 2025년 보고서에서 AI 기반 노출 평가 분야에서 현재 가장 주목해야 할 기업으로 Tenable 선정
메타버스가 공격 표면에 포함되면 무슨 일이 발생합니까?
Tenable polled 1,500 cybersecurity, IT and DevOps professionals about their top concerns in the nascent virtual reality worlds of the metaverse. Here's what we found out.
Tenable Cyber Watch: 조기 개입(shift left) 과제, 랜섬웨어 방지 노력, 퀀텀 위험 및 CISO 불안감
Beat the Monday blues with cyber news you can use | Shift-left efforts falling short. The White House’s war on ransomware. Everything you’ve ever wanted to know about CISOs. The quantum computing risk for critical infrastructure. Don’t miss the latest episode of the Tenable Cyber Watch. The…
사이버 보안 스냅샷: Log4j 1주년, CI/CD 위헙, Infostealers(정보 도용자), 이메일 공격, OT 보안
Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more!
클라우드 보안: 5 Key Takeaways from the SANS DevSecOps Survey
A recent SANS Institute report finds that DevSecOps teams are improving their tooling, processes and techniques, but their organizations’ increasingly hybrid and multi-cloud IT environments are getting harder to secure. Check out key highlights from the “SANS 2022 DevSecOps Survey.”
Are You Ready for the Next Log4Shell? Tenable’s CSO and CIO Offer Their Advice
Tenable CIO Patricia Grant and CSO Robert Huber share insights and best practices to help IT and cybersecurity leaders and their teams weather the next cyber crisis of Log4j proportions.
NETGEAR Router Misconfiguration Opens The Door For Remote Attacks
Tenable Research has discovered a configuration issue impacting NETGEAR Nighthawk WiFi6 Routers commonly used in small offices and large homes. Organizations need to manually apply firmware updates.
Introducing the Tenable Cyber Watch, Your Weekly Cyber Newscast
Cybersecurity professionals are inundated with too much information. Separating the signal from the noise is hard. The Tenable Cyber Watch is here to help. Today, Tenable launches Cyber Watch, a weekly video news program highlighting topics that are top-of-mind for cybersecurity professionals…
사이버 보안 스냅샷: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory
Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more!
Active Directory Vulnerabilities: How Threat Actors Leverage AD Flaws in Ransomware Attacks
Adopting a proactive stance will give enterprises the head start to shut down new threats to Active Directory whenever they are uncovered.