Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable ブログ

2026/3/31

Axios npm パッケージに対するサプライチェーン攻撃: 範囲、影響、および対策

The Axios npm package has been compromised in a supply chain attack that uploaded new versions of the package containing malicious code. Any environment that downloaded these compromised Axios versions is at risk of severe data theft, including the loss of credentials and API keys. Scan your environment now.

2023 年 2 月 9 日

How to Implement CIEM – A Checklist

What differentiates a CIEM solution from other cloud security platforms, and how should a CIEM be used in an organization? Read on to find out.


2023 年 2 月 9 日

Tenable の EASM ソリューションからデータと価値を抽出する

It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data.


February 6, 2023

Tenable サイバーウォッチ: IoT ベンダーは脆弱性を適切に開示していない、サイバーセキュリティはビジネス上の最大の懸念事項、連邦機関は GAO の勧告を完全に実施していない

This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the GAO's frustrations with federal agencies not heeding their cybersecurity advice and provides…


2023/2/3

話題の ChatGPT に対して NIST が AI セキュリティガイドラインを発表

Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. その他。


2023/2/1

今こそ米国政府がアフリカのサイバーセキュリティ強化を支援する時だ

African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. 


2023/2/1

How Attackers Can Exploit GCP’s Multicloud Workload Solution

A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations.


January 31, 2023

ProxyNotShell、OWASSRF、TabShell: Microsoft Exchange サーバーに今すぐセキュリティパッチを適用する

Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended.


2023/1/30

Tenable サイバーウォッチ: CISO の仕事満足度、開発者がセキュリティ対策に苦労する理由、AI を使用してセキュリティリスクを軽減する

This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back.  Ever wonder how happy your CISO is at…


2023/1/27

サンドワームの新たな攻撃 : Active Directory グループポリシーを悪用した新種のワイパー型マルウェア

Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer.


役立つサイバーセキュリティ関連のニュース

Tenable エキスパートからのタイムリーな警告とセキュリティガイダンスを見逃さないように、メールアドレスをご入力ください。