Tenable 博客
Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI’s New Safety Tech

網路安全快照: CISA Issues Incident Response Tool for Microsoft Cloud Services
Learn about a free tool for detecting malicious activity in Microsoft cloud environments. Plus, Europol warns about ChatGPT cyber risks. Also, how business email compromise (BEC) scammers are stealing merchandise. In addition, CISA alerts orgs about early-stage ransomware breaches. And much more! ...
据报道,Windows 和 macOS 版 3CX 桌面应用程序在供应链攻击中受损
A softphone desktop application from 3CX, makers of a popular VoIP PBX solution used by over 600,000 organizations, has reportedly been trojanized as part of a supply chain attack...
混合云安全的五个核心原则
How to build a hybrid-cloud security strategy that is effective, scalable and affordable. ...
风险暴露管理:平台方案的 7 大优势
在谈到预防性网络安全时,长期以来就争议不断:使用一系列最佳的单点解决方案更有效,还是采取更加整合的平台方案更有效。Here are seven reasons an exposure management platform can help reduce cyber risk....
EPA 颁布针对公共供水系统的网络安全法规:Tenable 能够带来哪些助益
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....
Tenable 网络观察:U.K. 网络机构担忧 ChatGPT 会造成隐私问题,CISA 计划应对关键基础设施中的勒索软件,等等
This week’s edition of the Tenable Cyber Watch unpacks CISA’s new pilot program that detects vulnerabilities in critical infrastructure and addresses the FBI’s plea for more ransomware victims to report attacks. Also covered: Why the U.K. National Cyber Security Centre is warning ChatGPT users to tr...
Federating Kubernetes Workloads with Cloud Identities
Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely....
网络安全快照: 使用全新的 CISA/NSA 最佳实践加强身份和访问管理安全
Learn about a new guide packed with best practices recommendations to improve IAM systems security. Plus, cybersecurity ranks as top criteria for software buyers. Also, guess who’s also worried about ChatGPT? Oh, and do you know what a BISO is? And much more! ...
Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important
Segregation in cloud environments is important for security — this post explores why and offers best practice tips for acting on it....