落とし穴に注意! 既存の脆弱性フレームワークが組織を危険にさらす
This is the second of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we explore how common industry frameworks leave security teams with blind spots — and…
落とし穴に注意! 2022 年に公開された脆弱性の詳細
This is the third of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we take a closer look at the vulnerabilities disclosed in 2022 —and discuss how Tenable…
落とし穴に注意! 2022 年の注目すべき 8 件の CVE
This is the last of a four-part series examining the period of time between when a vulnerability is first discovered and when it is fully disclosed on the National Vulnerability Database. In this installment, we examine eight notable CVEs with significant gaps in disclosure timelines and discuss…
Tenable サイバーウォッチ: 従業員の約 50% が以前の雇用主のアカウントにアクセスしたことがある、米政権、AI の説明責任について一般から意見を募る
This week’s edition of the Tenable Cyber Watch unpacks why organizations are looking to consolidate cyber vendors and addresses the White House’s efforts to make sure AI products are safe. また、 Businesses must improve password management: a new study reveals nearly 50% of ex-employees have…
サイバーセキュリティニュース: CSA、組織で ChatGPT を安全に活用する方法に関するガイダンスを提供
Check out the Cloud Security Alliance’s white paper on ChatGPT for cyber pros. Plus, the White House’s latest efforts to promote responsible AI. Also, have you thought about vulnerability management for AI systems? In addition, the “godfather of AI” sounds the alarm on AI dangers. その他。
Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad
Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions.
Tenable Cloud Security Agentless Assessment for Microsoft Azure のご紹介
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.
州全体サイバーセキュリティアプローチによる地方自治体機関の保護
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…
Tenable サイバーウォッチ: RSA カンファレンスで注目を集めた 3 つのトピックス、Samsung の従業員が機密データを ChatGPT に漏えいする
This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry.
RSA カンファレンス特別版: AI と ChatGPT が注目を集める
Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!
IDC、Tenable を 4 年連続で世界のデバイス脆弱性管理市場のマーケットシェア 1 位に格付け
市場調査会社 IDC の最新の調査報告書は、結果とともにセキュリティ専門家が脆弱性管理戦略を改善するために役立つ市場に関する洞察も提供します。
Kubernetes のセキュリティを向上させるための 4 つのベストプラクティス
How to ensure the right configurations and policies are in place to keep your cloud environments secure.