現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Aug. 12 (Black Hat Special Edition) | The Black Hat USA conference returned to Las Vegas this week to celebrate its 25th anniversary, as thousands of security pros gathered in the desert to get wiser about critical challenges, including cloud security…
Tenable Cloud Security Agentless Assessment の活用で AWS の脆弱性を迅速に検出して対応
Learn how to leverage our latest cloud security discovery feature, Tenable Cloud Security Agentless Assessment, to enhance the way you can scan for software vulnerabilities and misconfigurations in the cloud.
Agentless Assessment と Live Results を備えた Tenable Cloud Security のリリースのお知らせ
Tenable は、最新のクラウドセキュリティ機能強化によってクラウドセキュリティ態勢と脆弱性管理を統合し、新しい、 100% API 化されたスキャンおよびゼロデイ検出機能を提供します。
3 Ways to Reduce the Risk from Misused AWS IAM User Access Keys
Used incorrectly, AWS IAM user access keys can pose high risk; the good news is that great alternatives, explored here, exist.
マイクロソフトの 2022 年 8 月月例更新プログラム、118 件の脆弱性に対処 (CVE-2022-34713)
Microsoft addresses 118 CVEs in its August 2022 Patch Tuesday release, including 17 critical flaws.
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending Aug. 5 | Don’t take your eye off the Log4j ball. The dangers of unsupported software. Why low MFA adoption is everyone’s problem. Preventing ransomware attacks. その他。
2021 年マルウェア上位リストに関連する脆弱性の分析
国際的なサイバーセキュリティ機関は、2021 年に観測された上位のマルウェアの種類について説明する共同サイバーセキュリティアドバイザリ (CSA) を発表しました。本記事では、関連する脆弱性について解説します。
CVE-2022-31656: VMware、複数の製品における複数の脆弱性にパッチを適用 (VMSA-2022-0021)
VMware has patched another set of serious vulnerabilities across multiple products including VMware Workspace ONE Access. Organizations should patch urgently given past activity targeting vulnerabilities in VMware products.
現在のサイバーセキュリティ対策における 6 つの重要事項
Topics that are top of mind for the week ending July 29 | Boost your security awareness program. Why fire drills hurt security teams. A quick temperature check on attack surface management. Protecting smart factories from cyberattacks. And much more!
3 Types of Cyber Attackers: Which Organizations Do They Target?
Is an attacker interested in your organization? Probably. Deconstructing the PoV of cyberattackers is key to defending your turf.
ランサムウェアのエコシステム: 名声と富を求める
The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune.
国家安全保障電気通信諮問委員会(NSTAC)、米国連邦政府機関によるゼロトラスト導入を奨励
Kudos to the National Security Telecommunications Advisory Committee for its report on boosting zero trust and ID management. As the Biden administration looks to implement its recommendations, a strong focus on vulnerability management would optimize opportunities for success.