Tenable ブログ
サイバーセキュリティニュース: Fending Off BRICKSTORM Malware Data-Theft Attacks and Integrating AI into OT Securely
Uncovering 3 Azure API Management Vulnerabilities – When Good APIs Go Bad
Learn how now-patched Azure API Management service vulnerabilities revealed by our research team enabled malicious actions.
Tenable Cloud Security Agentless Assessment for Microsoft Azure のご紹介
Tenable Cloud Security users now can quickly connect their Azure cloud accounts to perform cloud security posture management, including scanning for security vulnerabilities, misconfigurations and compliance. Here’s how.
州全体サイバーセキュリティアプローチによる地方自治体機関の保護
Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via…
Tenable サイバーウォッチ: RSA カンファレンスで注目を集めた 3 つのトピックス、Samsung の従業員が機密データを ChatGPT に漏えいする
This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry.
RSA カンファレンス特別版: AI と ChatGPT が注目を集める
Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!
IDC、Tenable を 4 年連続で世界のデバイス脆弱性管理市場のマーケットシェア 1 位に格付け
市場調査会社 IDC の最新の調査報告書は、結果とともにセキュリティ専門家が脆弱性管理戦略を改善するために役立つ市場に関する洞察も提供します。
Kubernetes のセキュリティを向上させるための 4 つのベストプラクティス
How to ensure the right configurations and policies are in place to keep your cloud environments secure.
業界を先導する Tenable の Security End-of-Life プラグインプログラム
Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers.
Kubernetes のセキュリティ保護に関する重要な考慮事項
The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s…