Tenable 博客
From Vulnerability to Visibility: What the SharePoint Attacks Reveal About the Need for Proactive Cybersecurity

Tenable 网络观察:研究发现,许多 CISO 都欠缺在董事会任职的资格,网络安全如何促进业务拓展,等等
This week’s edition of Tenable Cyber Watch unpacks the new comprehensive guide on LockBit, the world’s most deployed ransomware variant, and explores how cybersecurity can boost business. Also covered: a new study finds many CISOs to be unqualified to serve on boards. ...
网络安全快照: ChatGPT-like Tools Will Boost Developers’ Speed – and Amplify Cyber Risk
Learn about the promise and peril of generative AI for software development – and how it makes business execs both happy and fearful. Plus, do cyber teams underestimate risk? Also, NIST has a new AI working group – care to join? And much more!...
An Unexpected Implication of Lambda Privileges
Learn how a combination of AWS service usage and permissions discovered by Tenable Cloud Security may increase risk upon a certain non-compliance....
Tenable 网络观察:联邦政府悬赏 1000 万美元征集 CL0P 线索、应对勒索病毒事件的最佳实践等等
This week’s edition of Tenable Cyber Watch unpacks the $10 million bounty issued by the U.S. State Department’s Rewards for Justice program for information on the CL0P gang and shares four best practices for ransomware incident response. Also covered: a new study finds U.S. critical infrastructure t...
网络安全快照: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill
Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!...
The Default Toxic Combination of GCP Compute Engine Instances
By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix....
OT 海上安全:惊涛骇浪还是一帆风顺?
在网络安全方面,海事行业就像是在一片不断变化的海洋中遨游。 互联船舶和新技术使航运界变得更加高效,但也带来了网络安全风险。 Here's what you need to know about the challenges and risks these floating cities face —...
风险暴露管理如何让渗透测试更有效
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process....
一种降低车间风险的实用方法
对制造车间的网络安全,大家众说纷纭,但从何处着手呢?我们简单地讨论一下攻击者为何会这样做,以及您可以采取哪些措施来加以阻止。采取这些措施的目标都在于减少风险,尽最大努力获得最佳结果。Read on to learn mor...