網路安全快照: 美国,英国政府就如何构建安全的 AI 系统提供建议
Looking for guidance on developing AI systems that are safe and compliant? Check out new best practices from the U.S. and U.K. cyber agencies. Plus, a new survey shows generative AI adoption is booming, but security and privacy concerns remain. In addition, CISA is warning municipal water plants…
Tenable 网络观察:NCSC 为量子威胁提供指导,SBOM 采用安全软件供应链,等等
This week’s edition of Tenable Cyber Watch unpacks what organizations need to do to prepare for quantum computing attacks and addresses SBOM adoption to help organizations beef up the security of the software supply chain. Also covered: 美国Office of Management and Budget drafts guidance for…
網路安全快照: 美国Gov’t Revises, Seeks Input on Security Assessment Questionnaire for Software Vendors
Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. Plus, it’s warning cyber teams about the threats from the Rhysida and Scattered Spider cybercrime groups. In addition,…
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads.
Tenable 网络观察:11 月已宣布为关键基础设施安全和恢复月,等等
This week’s edition of Tenable Cyber Watch unpacks Critical Infrastructure Security and Resilience month and addresses the “Shields Ready” campaign aimed at promoting critical infrastructure security and resilience. Also covered: Do most organizations need a generative AI policy? What one poll…
網路安全快照: Are SBOMs on Your Supply Chain Security Radar Screen? Check Out New Recommendations from CISA and NSA
The SBOM concept is still half-baked, but CISA and NSA want to help change that with new best practices for software vendors, developers and buyers. Plus, there’s new guidance about the Royal ransomware gang – as ransomware attacks grow. In addition, Google highlights a new typosquatting trend…
Tenable Nessus Scanner Capabilities Receive Red Hat Recognition
The Red Hat Vulnerability Scanner Certification for Tenable Nessus represents our commitment to continue providing customers with visibility into their Red Hat Enterprise Linux systems. Read about what this means and how it benefits our customers.
Tenable 网络观察:Average Org Fails to Prevent 43% of Attacks, AI Models Lack Transparency, and more
This week’s edition of Tenable Cyber Watch unpacks why organizations fail to prevent more than 40% of cyberattacks and addresses how the White House plans to tackle AI. Also covered: Study shows AI models lack transparency.
網路安全快照: Critical Infrastructure Security in the Spotlight in November
It’s “Critical Infrastructure Security and Resilience Month” – check out new resources from the U.S. government to better protect these essential organizations. Plus, the U.K.’s cyber agency is offering fresh guidance for mitigating the quantum computing threat. In addition, do you need a…
Tenable 网络观察:GenAI Drives AI Adoption for Cybersecurity, Ransomware Attacks Double in Q3, and more
This week’s edition of Tenable Cyber Watch unpacks how generative AI is driving AI adoption for cybersecurity and addresses why board directors are becoming more confident in their organization’s cybersecurity. Also covered: Ransomware attacks almost doubled in Q3.
網路安全快照: Why Organizations Struggle to Prevent Attacks and How They Can Do Better
Find out the top people, process and technology challenges hurting cybersecurity teams identified in a commissioned study by Forrester Consulting on behalf of Tenable.
网络观察:Tenable CSO Bob Huber 谈会给公司带来风险的常见员工行为
On this special edition of Tenable Cyber Watch, Tenable CSO Bob Huber discusses whether certain common employee behaviors are security risks for a company - red flags 🔴 or green flags 🟢.