Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable ブログ

April 27, 2026

NVD による CVE 情報のエンリッチメント対象制限について Tenable のお客様が知っておくべきこと

NIST’s shift toward selective CVE enrichment creates significant visibility gaps for teams relying solely on the National Vulnerability Database. As AI accelerates vulnerability disclosure rates, organizations need independent, high-fidelity intelligence to prioritize risks that the NVD may now overlook.

February 17, 2022

Tenable による Cymptom の買収:「攻撃経路に基づく」サイバーセキュリティのアプローチ

Tenable の最近の買収はすべて、サイバー攻撃のアタックサーフェスに関するセキュリティについての深い知見をお客様に提供するという1つの包括的な目標に沿って実行されています。


February 16, 2022

Cloud Identities and the Not So Long and Slightly Winding Road to Governance

A look at Forrester’s roadmap for the deployment and use of CIG to decrease the cloud threat surface and the costs of cloud data protection.


February 15, 2022

Log4Shell: 2 つの検出技術

エンドポイント検出応答 (EDR) では、Log4j のインスタンスを特定することしかできません。Here’s why dynamic checks are needed to uncover vulnerable versions of Log4j.


February 9, 2022

CVE-2022-22536: SAP、Internet Communication Manager Advanced Desync (ICMAD) の脆弱性を修正

SAP and Onapsis Research Labs collaborate to disclose three critical vulnerabilities impacting SAP NetWeaver Application Servers. The most severe of the three could lead to full system takeover. Background On February 8, SAP disclosed several vulnerabilities in the Internet Communication…


February 9, 2022

How CSPM and CIEM may Solve your Cloud Compliance Challenges

With compliance essential to your organization, what strategy to take? Can you rely on a standard cloud security posture management tool — or do you need more?


February 8, 2022

マイクロソフト 2022 年 2 月月例セキュリティ更新プログラム、 48 件の CVE を修正 (CVE-2022-2198)

Microsoft addresses 48 CVEs in its February 2022 Patch Tuesday release, including one zero-day vulnerability that was publicly disclosed, but not exploited in the wild.


February 3, 2022

Keep Your S3 Safe from CloudTrail Auditors

AWSCloudTrailReadOnlyAccess currently allows s3:GetObject for “*” and s3:ListAllMyBuckets. And reading CloudTrail logs may also give access to bucket object keys. Be careful!


February 3, 2022

CVE-2022-20699、CVE-2022-20700、CVE-2022-20708: Cisco Small Business RV シリーズルータにおける「緊急」の脆弱性が発見される

Cisco patches 15 flaws in Cisco Small Business RV Series Routers, including three with critical 10.0 CVSSv3 scores. Update February 4: Cisco has updated their advisory to announce partial patches for the RV160 and RV260 Series Routers. The Solution section has been updated with this…


February 2, 2022

新機能発表: クラウドネイティブセキュリティをライフサイクル全体で提供

Tenable.cs の最新機能は、企業がアジャイルに立ち振る舞いながらリスクを削減できるように作られています。A suite of upgrades to Tenable.cs, our cloud-native application protection platform, are designed to enable organizations to secure cloud resources, container images and cloud assets to…


役立つサイバーセキュリティ関連のニュース

Tenable エキスパートからのタイムリーな警告とセキュリティガイダンスを見逃さないように、メールアドレスをご入力ください。