Tenable ブログ
How Tenable’s Security Team Went from Thousands of Alerts to a Handful of Tickets with Exposure Management

話題の ChatGPT に対して NIST が AI セキュリティガイドラインを発表
Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!...
今こそ米国政府がアフリカのサイバーセキュリティ強化を支援する時だ
African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. ...
How Attackers Can Exploit GCP’s Multicloud Workload Solution
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations....
ProxyNotShell、OWASSRF、TabShell: Microsoft Exchange サーバーに今すぐセキュリティパッチを適用する
Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended....
Tenable サイバーウォッチ: CISO の仕事満足度、開発者がセキュリティ対策に苦労する理由、AI を使用してセキュリティリスクを軽減する
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back. Ever wonder how happy your CISO is at ...
サンドワームの新たな攻撃 : Active Directory グループポリシーを悪用した新種のワイパー型マルウェア
Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer....
サイバーセキュリティニュース: 大半の IoT 製品メーカーは脆弱性開示プログラムを実施していない。ビジネスの最大の懸念事項はサイバーリスク
Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!...
外部アタックサーフェスのデータを分析してセキュリティ戦略を強化
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a legacy tool. Learn how Tenable.asm can help you mine this data quickly and precisely....
Tenable.sc 6.0: 可視性と生産性を向上させるメジャーアップデート
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of Tenable.sc 6.0, customers can now take advantage of significant new capabilities and enhancements, like a...