在 DoD 的 OT 系统中强化网络保护
Operational technology plays a major role in many aspects of the U.S. Department of Defense — including in military operations, in the infrastructure on bases and throughout the supply chain. Strengthening the cyber defenses of these systems is imperative. 以下是需要了解的信息。
提升您的云安全战略
Learn how to better your cloud security program with these ten security resolutions.
利用内部日志更好地实施异常检测和事件响应
Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks.
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works.
展望未来: 2024 年值得关注的 5 大云安全趋势
生成式 AI 无疑将提升企业的网络安全能力。 然而,如果不能先实施坚实的云安全原则,网络安全部门就很难从生成式 AI 中获得收益。 In this blog, we explain the top cloud security trends that organizations must track –…
打造弹性的 OT 环境: 针对电力公共事业公司的保护措施
最近针对重要基础设施的网络攻击展示了黑客利用工业控制系统的方法。采用最新漏洞管理最佳实践的企业将能做好最充分的准备来降低风险和缓解可能受到的损害。
学习热爱审计和合规性 - 一切皆有可能
对于大多数企业来说,保护公有云中运行的工作负载并满足合规性标准是一个不容商榷的任务。但是,将必要的可见性、映射和监控能力结合在一起,通常是一个手动且耗时的过程。 As a result, audits and compliance exercises…
Tenable 深受鼓舞:2023 年我们的业界认可度回顾
Respected analyst firms and industry experts once again validated the exceptional quality, innovation and performance of Tenable products.
如何应对 OT 挑战:资产清单和漏洞评估
The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help.
AWS Access Analyzer 日新月异,Tenable Cloud Security 不落下风
AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA)…
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads.