Introducing the Tenable Cyber Watch, Your Weekly Cyber Newscast
Cybersecurity professionals are inundated with too much information. Separating the signal from the noise is hard. The Tenable Cyber Watch is here to help. Today, Tenable launches Cyber Watch, a weekly video news program highlighting topics that are top-of-mind for cybersecurity professionals…
網路安全快照: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory
Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more!
網路安全快照: Insights on Hive Ransomware, Supply Chain Security, Risk Metrics, Cloud Security
Get the latest on the Hive RaaS threat; the importance of metrics and risk analysis; cloud security’s top threats; supply chain security advice for software buyers; and more!
A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations
With the right ingredients, you can nail your board presentation every time. Check out these recommendations from seasoned Fortune 1000 CISOS. Presenting to the board can seem like the most daunting task to CISOs - but it doesn't have to be. It's as much about the preparation as it is having the…
網路安全快照: Insights on Log4j, Memory Attacks, Cloud Security, Ransomware
Get the latest on an APT’s Log4Shell exploit; tips to prevent memory attacks; cloud security trends; metaverse security; and more!
Translating OT Security Recommendations into U.S. Policy Outcomes
A recent NSTAC report to the president outlined additional strategies to secure the convergence of information technology and operational technology.
網路安全快照: Insights on Supply Chain Security, Hiring, Budgets, K8s, Ransomware
Get the latest on staffing challenges; nation-state assaults on critical infrastructure; supply chain security tips; ransomware weak links; Kubernetes security; and more!
Shift left: Still a Work in Progress
Experts say “shift left” practices are falling short. Here’s what you need to know and what you can do about it. Researchers are calling on companies to do a better job of educating developers about security after a study shows shift left practices have fallen short. Shifting left is an…
網路安全快照: Salary Trends, Ransomware Summit, Next-gen MFA
Get the latest on salary trends for CISOs and cybersecurity pros; CISA’s call for adopting phishing-resistant MFA; the White House’s ransomware summit; and more!
網路安全快照: Tips for cloud configs, MSP vetting, CISO board presentations
Get the latest on Microsoft 365 security configurations; effective CISO board presentations; rating MSPs’ cybersecurity preparedness; and hospitals’ Daixin cyberthreat.
To Boost Software Supply Chain Security, Stop the Finger-Pointing
Google’s annual DevOps report finds that organizations with a low-blame, collaborative approach have stronger app dev security practices.
Cybersecurity Snapshot: 6 Things That Matter Right Now
Topics that are top of mind for the week ending Oct. 21 | The problem with Gen Zers and Millennials | Global shortage of cybersecurity pros worsens | An informal poll about attack surface growth | Password usage drops a bit | And much more!