Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 博客

September 11, 2025

Code-to-Cloud Visibility: Why Fragmented Security Can’t Scale

Widespread visibility is critical for cloud security, but obtaining it is easier said than done. To discover insights and best practices for code-to-cloud visibility, check out highlights from a new IDC white paper. Plus, learn how Tenable’s CNAPP and exposure management platform give you an unimpeded view of your multi-cloud and hybrid environment.

July 11, 2023

Microsoft 2023 年 7 月补丁星期二解决了 130 个 CVE (CVE-2023-36884)

Microsoft addresses 130 CVEs including five that were exploited in the wild as zero-day vulnerabilities and guidance on the malicious use of Microsoft signed drivers.


July 10, 2023

Tenable 网络观察:研究发现,许多 CISO 都欠缺在董事会任职的资格,网络安全如何促进业务拓展,等等

This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards.


July 7, 2023

网络安全快照: ChatGPT-like Tools Will Boost Developers’ Speed – and Amplify Cyber Risk

Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? And much more!


July 4, 2023

An Unexpected Implication of Lambda Privileges

Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance.


July 3, 2023

Tenable 网络观察:联邦政府悬赏 1000 万美元征集 CL0P 线索、应对勒索病毒事件的最佳实践等等

This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure…


June 30, 2023

网络安全快照: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill 

Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!


June 29, 2023

The Default Toxic Combination of GCP Compute Engine Instances

By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix.


June 29, 2023

OT 海上安全:惊涛骇浪还是一帆风顺?

在网络安全方面,海事行业就像是在一片不断变化的海洋中遨游。 互联船舶和新技术使航运界变得更加高效,但也带来了网络安全风险。 Here's what you need to know about the challenges and risks these floating cities face …


June 28, 2023

风险暴露管理如何让渗透测试更有效

Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.


您可加以利用的网络安全新闻

输入您的电子邮件,绝不要错过 Tenable 专家的及时提醒和安全指导。

了解勒索软件生态系统

下载报告 >