Tenable ブログ
サイバーセキュリティニュース: 攻撃された SharePoint の脆弱性に緊急パッチがリリース、米国政府が AI 行動計画を発表

サイバーセキュリティニュース: サイバー機関がモバイルスパイウェア攻撃に注意するよう警告、企業の取締役会がサイバーガバナンスのガイダンスを受ける
Check out why a global geopolitical spyware campaign could ensnare mobile users outside of its target groups. Plus, the U.K.’s cyber agency offers cyber governance resources to boards of directors. Also, find out what webinar attendees told Tenable about using port scanning and service discovery to ...
MCP(Model Context Protocol)と AI エージェントアプリケーションとの統合に関するよくある質問
The emergence of Model Context Protocol for AI is gaining significant interest due to its standardization of connecting external data sources to large language models (LLMs). While these updates are good news for AI developers, they raise some security concerns. In this blog we address FAQs about MC...
5 分でわかるクラウドセキュリティ強化対策: クラウド構成セキュリティの重要性
Mismanaging configurations in your multi-cloud environment can put you at an elevated risk for cyber attacks. In the first installment of our “Stronger Cloud Security in Five” blog series, we outline five best practices for boosting your cloud configuration management....
マイクロソフトの 2025 年 4 月月例セキュリティ更新プログラム: 121 件の CVE を修正(CVE-2025-29824)
Microsoft addresses 121 CVEs including one zero-day which was exploited in the wild....
ジャストインタイム アクセスの実装方法: ベスト プラクティスと教訓
With the just-In-time (JIT) access control method, privileges are granted temporarily on an as-needed basis. This reduces static entitlements, lowering the risk of compromised accounts and preventing privilege creep. In this blog, we’ll share how we implemented JIT access internally at Tenable using...
エクスポージャー管理に移行するための 5 つのステップ
毎週月曜日、Tenable のサイバーエクスポージャー管理アカデミーでは、脆弱性管理からサイバーエクスポージャー管理への移行に必要な、実用的かつ現実的なガイダンスを提供しています。 In this post, we explore the five steps to take on your journey to exposure management....
サイバーセキュリティニュース: SANS が AI システムのサイバーセキュリティ対策のための 6 つのコントロールを推奨、 NCSC が時代遅れの API セキュリティ手法について警告
Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security practices. In addition, CISA and other cyber agencies warn that attackers are using “fast flux” techniques to conceal their actio...
Tenable で GitLab の権限管理を強化
If your organization uses GitLab for managing your software development lifecycle, you must ensure you’re not misconfiguring the permissions of this open source DevSecOps platform. Doing so can expose your source code, along with sensitive data, while creating security risks. In this blog, we’ll exp...
ImageRunner: GCP Cloud Run に影響を与える権限昇格の脆弱性
Tenable Research discovered a privilege escalation vulnerability in Google Cloud Platform (GCP) that is now fixed and which we dubbed ImageRunner. At issue are identities that lack registry permissions but that have edit permissions on Google Cloud Run revisions. The vulnerability could have allowed...