Tenable 블로그
가트너®, 2025년 보고서에서 AI 기반 노출 평가 분야에서 현재 가장 주목해야 할 기업으로 Tenable 선정
$1 Billion State and Local Cybersecurity Grant Program Now Open for Applicants
As threats continue to evolve, state and local governments benefit from federal grant funding to bolster their cybersecurity posture.
전체 공격 표면에서 마침내 '알 수 없는 사항' 찾기
CISO는 보안 팀이 탐지하지 못하여 보호하지 못한 자산, 취약성, 구성 오류 및 시스템 약점 같은 '알 수 없는' 사항을 두려워합니다. 이러한 사각지대는 공격자에게는 절호의 기회이며 조직에는 주요 보안 위험이 됩니다.
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Sept. 16 | How cybersecurity excellence boosts business | CISOs on a vendor-consolidation campaign | A quick check on converged OT/IT cybersecurity | Guides to help developers beef up on security | And much more!
AA22-257A: Cybersecurity Agencies Issue Joint Advisory on Iranian Islamic Revolutionary Guard Corps-Affiliated Attacks
Several global cybersecurity agencies publish a joint advisory detailing efforts by Iranian-government sponsored threat actors exploiting vulnerabilities to enable ransomware attacks.
CVE-2022-40139: Vulnerability in Trend Micro Apex One Exploited in the Wild
Trend Micro has patched six vulnerabilities in its Apex One on-prem and software-as-a-service products, one of which has been exploited in the wild.
IDSA Introduces CIEM Best Practices
The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management.
Microsoft’s September 2022 Patch Tuesday Addresses 62 CVEs (CVE-2022-37969)
Microsoft addresses 62 CVEs in its September 2022 Patch Tuesday release, including five critical flaws.
Tuning Network Assessments for Performance and Resource Usage
Using the correct tool for the job and optimizing scanner placement will have a large impact on scan efficiency with Nessus, Tenable.io and Tenable.sc.
사이버 보안 스냅샷: 바로 지금 중요한 6가지 사항
Topics that are top of mind for the week ending Sept. 9 | Software supply chain security in the spotlight. Guidance for evaluating IoT security tools. Increasing diversity in cybersecurity. Another look at the major cloud security threats. And much more!