Tenable 博客
推出 Tenable AI Exposure: 不再猜测,开始保护企业 AI 攻击面

不是攻击路径分析的高手? Tenable ExposureAI 助您实现主动安全
With attacks becoming more sophisticated, security teams must spend more time analyzing different entry points into the organization, as well as numerous tactics, techniques and procedures. Find out how Tenable ExposureAI helps you overcome these challenges and enhances your efficiency and productiv...
網路安全快照: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto
Cyber agencies from multiple countries published a joint guide on using artificial intelligence safely. Meanwhile, CERT’s director says AI is the top skill for CISOs to have in 2024. Plus, the UK’s NCSC forecasts how AI will supercharge cyberattacks. And a global survey shows cyber pros weighing pro...
在 DoD 的 OT 系统中强化网络保护
Operational technology plays a major role in many aspects of the U.S. Department of Defense — including in military operations, in the infrastructure on bases and throughout the supply chain. Strengthening the cyber defenses of these systems is imperative. Here’s what you need to know. ...
CVE-2024-0204:Fortra GoAnywhere MFT 身份验证绕过漏洞
Proof-of-concept exploit details are available for a newly disclosed critical vulnerability in Fortra GoAnywhere Managed File Transfer (MFT), a product historically targeted by ransomware...
CVE-2023-22527:Atlassian Confluence 数据中心和服务器模板注入在现实环境中遭利用
In the wild exploitation has begun for a recently disclosed, critical severity flaw in Atlassian Confluence Data Center and Server...
提升您的云安全战略
Learn how to better your cloud security program with these ten security resolutions. ...
網路安全快照: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response
Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. Plus, the challenges stressing out CISOs are also opening new doors for them. In addition, the latest on the Androxgh0st malware. A...
利用内部日志更好地实施异常检测和事件响应
Tenable Cloud Security enriches cloud activity log data to give you the context you need to quickly respond to and remediate cloud risks....
Tenable Cloud Security Now Supports the Generation of Pull Requests for Remediation Suggestions
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....