Tenable のクラウドセキュリティ調査の驚くべき結果: 調査対象組織の 95% が 18 か月間にわたってクラウド環境における侵害の被害を受けていた
「Tenable 2024 年クラウドセキュリティの展望」の調査結果は、先行的で堅牢なクラウドセキュリティが必要であることを明確に示しています。 Read on to learn more about the study’s findings, including the main challenges cloud security teams face, their strategies for better protecting their cloud infrastruc...
Tenable、マルウェア検出でクラウドのセキュリティ対策を強化
Tenable Cloud Security は、マルウェア検出機能を強化しています。 Combined with its cutting-edge, agentless vulnerability-scanning technology, including its ability to detect anomalous behavior, this new capability makes Tenable Cloud Security a much more complete and effective solution. ...
FlowFixation: AWS Apache Airflow サービスが乗っ取られる脆弱性とガードレールの無視が大手 CSP をリスクにさらす
Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of m...
Tenable のシンプルなクラウドセキュリティで Kubernetes のイノベーションを解き放つ
Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters effortl...
Kubernetes のセキュリティ: 最小特権を強制し Kubernetes 環境のセキュリティを確保する
Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges inv...
マネージド型 Kubernetes のメリット
As an organization grows its usage of containers, managing them becomes more complex. A common response is to adopt Kubernetes for container orchestration. But how do you properly secure your Kubernetes clusters? And should your organization host its Kubernetes deployments or instead choose a manage...
サーバーレスアーキテクチャでクラウドネイティブアプリケーションを保護
Cybersecurity teams often struggle with securing cloud-native applications, which are becoming increasingly popular with developers. The good news is that deploying these applications on a serverless architecture can make it easier to protect them. Here’s why....
クラウド採用プロセスにおける意思決定者の主要な課題についての意見
Too many identities, systems and cooks in the kitchen cloud an already complex mandate....
クラウドセキュリティ戦略をレベルアップ
Learn how to better your cloud security program with these ten security resolutions. ...
Tenable Cloud Security、修復提案のプルリクエストの生成をサポート
The new capability is designed to make it more efficient for security teams to pass remediation recommendations on to the infrastructure team to implement. Here’s how it works....
2024 年に注目すべきクラウドセキュリティ動向トップ 5
生成 AI が組織のサイバーセキュリティ能力を向上させることは間違いありません。 しかし、最初にしっかりしたクラウドセキュリティの原則を適用しておかなければ、サイバーセキュリティ部門は生成 AI による成果をほとんど得られないでしょう。 In this blog, we explain the top cloud security trends that organizations must track – an...
Exfiltrated, Signed, Delivered – What Can Go Wrong When an Amazon Elastic Compute Cloud (EC2) Instance is Exposed to SSRF
Using CNAPPgoat, you can now experiment with a technique that leverages exposure to SSRF to trigger calls to AWS services from within an Amazon EC2 instance. ...