IAM Role Trust Update – What You Need to Know
When it comes to assuming roles, AWS is changing an aspect of how trust policy is evaluated; here is a quick digest of what this change may mean to you.
Tenable で連邦政府機関における CISA の拘束力のある運用指令 23-01 の要件を満たすには
Here’s how to leverage Tenable solutions to achieve compliance with BOD 23-01 from the Cybersecurity and Infrastructure Security Agency (CISA).
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Oct. 14 | DevOps team culture is key for supply chain security | SecOps gets more challenging as attack surface expands | Weak credentials hurt cloud security | Incident responders grapple with stress | Security spending grows | And much more!
セキュリティツールの統合化によりセキュリティ脅威を迅速に解決
CISOs want to shrink their cybersecurity tool stack and see improved interoperability among products so that they can draw actionable insights from uniform and normalized data. Here we explain why this is key for understanding your environment’s security posture and empowering you to make better…
Verizon’s 2022 Data Breach Report – Insights for Cloud Security Professionals
Wondering which cyberattack trends are putting your organization at risk? Learn about the leading threat vectors — and how cloud security solutions can help.
マイクロソフト 2022 年 10 月月例セキュリティ更新プログラム、84 件の CVE に対応(CVE-2022-41033)
Microsoft addresses 84 CVEs in its October 2022 Patch Tuesday release, including 13 critical flaws.
2022 年 CISO (最高情報セキュリティ責任者) 意識調査レポート
質問すれば、すぐ答えてくれる人。A global survey provides a snapshot of what it’s like to sit in the CISO chair, as these cybersecurity leaders face increasingly sophisticated cyber threats and heightened expectations from their organizations. They're questions that most…
Tenable.io: 制御するかしないか、それが問題だ
地理的またはビジネス的な境界を越えて Tenable.io を共有するような、大規模な Tenable のデプロイメントを行う際は、ロールベースアクセス制御 (RBAC) を活用することで、スキャンデータを論理的にセグメント化したり、必要に応じてスキャンデータへのアクセスを制限したりできます。In this blog, we’ll explain the configuration required to…
中国政府により支援を受けたサイバー攻撃者によって頻繁に悪用されている上位の CVE (AA22-279A)
CISA, the NSA and FBI issue a joint advisory detailing the top 20 vulnerabilities exploited by state-sponsored threat actors linked to the People’s Republic of China.
CVE-2022-40684: FortiOS および FortiProxy における「緊急」の認証バイパスの脆弱性
Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access.
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Not great | New malware cracks monthly top 10 list | And much more!
Public Network Access to Azure Resources Is Too Easy to Configure
For some types of Microsoft Azure resources and subnets, it’s extremely easy to configure what is essentially public network access. We describe here some examples and how to reduce such risks.