Tenable 블로그
사이버 보안 스냅샷: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say
완전한 IT 가시성을 위해서는 비즈니스 위험 컨텍스트가 필요
모든 IT 자산에 대해 완벽하게 지속적으로 업데이트하여 자세하게 이해하는 것은 보안 팀의 성배입니다. 이를 달성하려면 먼저 '가시성'이 무엇이며 이것이 단순히 무슨 자산이 있는지 식별하고 어떤 도전 과제를 해결해야 하는지 파악하는 것 이상이라는 것을 이해해야 합니다.
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Sept. 2 | Shift-left efforts falling short. What CISOs earn and what stresses them out. The quantum computing risk for critical infrastructure. Securing machine learning systems. And much more!
Taking Notice of AWS IAM Roles Anywhere
IAM Roles Anywhere may be a pivotal moment for security — the new service lets you enrich the arsenal of tools at your disposal to improve your AWS security posture.
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Aug. 26 | The “platformization” of hybrid cloud security. Budgeting guidance for CISOs. Tackling IT/OT cybersecurity challenges. Tips for complying with HIPAA’s cybersecurity rule. A roundup of patches, trends and incidents to keep an eye on. And much…
DevSecOps: An Organizational Fix for Improving Cloud Security – Friction-free
By implementing the DevSecOps culture, tools and training, you’ll be on your way to more shift-left security and less organizational friction. Here’s how.
New IT/OT Features Help Tenable Customers Increase Visibility, Security and Control
Tenable.ot v3.14 product features increase coverage of segmented networks and give broader visibility across your operational technology (OT) environment. Now more than ever, it is essential for organizations to understand their cybersecurity baseline. From malicious outsiders and insiders to…
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Aug. 19 | A ransomware defense blueprint for SMBs. Why phishing is getting worse and what to do about it. The government revises its cybersecurity guidance for pipeline operators. A roundup of important vulnerabilities, trends and incidents. And much…
Facing the Shift-Left Security Conundrum. A True Story
Shift left security is hot — until it's not. Dynamic business requirements and cloud complexity pose major least privilege challenges.
Ransomware Preparedness: Why Organizations Should Plan for Ransomware Attacks Like Disasters
As ransomware has cemented itself as one of the biggest cybersecurity threats to companies around the globe, it has become increasingly important that organizations treat ransomware attacks like they would a natural disaster and establish a robust preparedness plan.