Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

August 7, 2024

Securing the AI Attack Surface: Separating the Unknown from the Well Understood

There's a lot of confusion and unknowns regarding AI application risks, and a lot of vendors are trying to offer solutions to problems that aren't clearly defined. In this blog we explain why a smart approach is to start by focusing on basic, foundational cyber hygiene, adopt well-established best…


August 6, 2024

Do You Think You Have No AI Exposures? Think Again

As AI usage becomes more prevalent in organizations globally, security teams must get full visibility into these applications. Building a comprehensive inventory of AI applications in your environment is a first step. Read on to learn what we found about AI application-usage in the real world when…


August 6, 2024

Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach

As AI transforms industries, security remains critical. Discover the importance of a security-first approach in AI development, the risks of open-source tools, and how Tenable's solutions can help protect your systems.


August 5, 2024

风险暴露,止步于此:推出全新的 Tenable 品牌

At Tenable, our mission is to manage and reduce cyber risk, because cyber risk is business risk. Feedback from dozens of top CISOs is reflected in our latest brand evolution. Tenable is the exposure management company that helps customers know where their weaknesses lie, expose their risk and close…


August 5, 2024

将数据转化为行动:情报驱动的漏洞管理

使用上下文对漏洞进行优先级分析对漏洞管理团队而言总是困难重重,而且随着已公布 CVE 的持续增加,这项任务也变得越来越艰巨。To remedy this, many enterprises are forced to invest in products and services to protect their environments with various…


August 2, 2024

網路安全快照: Data Breach Costs Rise, as Ransomware Attacks Fall, Reports Find

IBM’s latest “Cost of a Data Breach Report” finds these data-theft incidents getting more expensive. Plus, the IT-ISAC says that ransomware attacks fell in Q2 due to law-enforcement disruptions of ransomware groups. Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI system…


July 31, 2024

Tenable Cloud Security To Help Fed Agencies Tackle Cloud Challenges as It Nears FedRAMP Authorization

As federal agencies adopt a cloud-first policy, they face unique challenges in securing cloud infrastructure. Learn how Tenable Cloud Security, which is now FedRAMP "In Process," can help.


July 30, 2024

EU AI Act: Will your company be the next to face the average €20 million fine for violating the regulation?

The European Union Artificial Intelligence Act includes specific provisions to ensure the cybersecurity of high-risk AI systems. We break down key elements of the ruling and offer guidance on how to prepare your organization.


July 30, 2024

Cyentia 和 FIRST 的研究表明,EPSS 在预测漏洞利用方面表现出色

Tenable 通过赞助 Cyentia 和 FIRST 进行的研究发现,尽管漏洞利用的形式千变万化,但 EPSS 在预测漏洞利用方面的能力却是越来越强大。


July 26, 2024

網路安全快照: North Korea’s Cyber Spies Hunt for Nuclear Secrets, as Online Criminals Ramp Up AI Use in the EU

Check out a CISA-FBI advisory about North Korean cyber espionage on critical infrastructure orgs. Plus, what Europol found about the use of AI for cybercrime. Meanwhile, the risk concerns that healthcare leaders have about generative AI. And a poll on water plant cybersecurity. 更多内容不一一列举!


July 24, 2024

ConfusedFunction:影响 GCP 云功能的权限提升漏洞

Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs…


July 23, 2024

Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design

With the unprecedented tech outages experienced by so many of our customers over the last week, we recognize the need for deeper understanding of our software development processes and how they support global business continuity. In this blog post, we’ll outline how Tenable’s comprehensive approach…


您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

Apache Log4j 缺陷让第三方软件成为关注焦点

获取详细信息 >

× 联系我们的销售团队