Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable ブログ

January 27, 2026

Introducing Tenable One AI Exposure: A New Standard for Securing AI Usage at Scale

Continuously discover and monitor all AI usage across your organization, including shadow AI, agents, browser plug-ins, and more, with Tenable One AI Exposure. Map complex AI workflows to reveal high-impact exposures and monitor compliance with security and AI acceptable use policies.

February 17, 2022

Tenable による Cymptom の買収:「攻撃経路に基づく」サイバーセキュリティのアプローチ

Tenable の最近の買収はすべて、サイバー攻撃のアタックサーフェスに関するセキュリティについての深い知見をお客様に提供するという1つの包括的な目標に沿って実行されています。


February 16, 2022

Cloud Identities and the Not So Long and Slightly Winding Road to Governance

A look at Forrester’s roadmap for the deployment and use of CIG to decrease the cloud threat surface and the costs of cloud data protection.


February 15, 2022

Log4Shell: 2 つの検出技術

エンドポイント検出応答 (EDR) では、Log4j のインスタンスを特定することしかできません。Here’s why dynamic checks are needed to uncover vulnerable versions of Log4j.


February 9, 2022

CVE-2022-22536: SAP、Internet Communication Manager Advanced Desync (ICMAD) の脆弱性を修正

SAP and Onapsis Research Labs collaborate to disclose three critical vulnerabilities impacting SAP NetWeaver Application Servers. The most severe of the three could lead to full system takeover. Background On February 8, SAP disclosed several vulnerabilities in the Internet Communication…


February 9, 2022

How CSPM and CIEM may Solve your Cloud Compliance Challenges

With compliance essential to your organization, what strategy to take? Can you rely on a standard cloud security posture management tool — or do you need more?


February 8, 2022

マイクロソフト 2022 年 2 月月例セキュリティ更新プログラム、 48 件の CVE を修正 (CVE-2022-2198)

Microsoft addresses 48 CVEs in its February 2022 Patch Tuesday release, including one zero-day vulnerability that was publicly disclosed, but not exploited in the wild.


February 3, 2022

Keep Your S3 Safe from CloudTrail Auditors

AWSCloudTrailReadOnlyAccess currently allows s3:GetObject for “*” and s3:ListAllMyBuckets. And reading CloudTrail logs may also give access to bucket object keys. Be careful!


February 3, 2022

CVE-2022-20699、CVE-2022-20700、CVE-2022-20708: Cisco Small Business RV シリーズルータにおける「緊急」の脆弱性が発見される

Cisco patches 15 flaws in Cisco Small Business RV Series Routers, including three with critical 10.0 CVSSv3 scores. Update February 4: Cisco has updated their advisory to announce partial patches for the RV160 and RV260 Series Routers. The Solution section has been updated with this…


February 2, 2022

新機能発表: クラウドネイティブセキュリティをライフサイクル全体で提供

Tenable.cs の最新機能は、企業がアジャイルに立ち振る舞いながらリスクを削減できるように作られています。A suite of upgrades to Tenable.cs, our cloud-native application protection platform, are designed to enable organizations to secure cloud resources, container images and cloud assets to…


役立つサイバーセキュリティ関連のニュース

Tenable エキスパートからのタイムリーな警告とセキュリティガイダンスを見逃さないように、メールアドレスをご入力ください。

× 営業チームに問い合わせる