Your Guide to IAM – and IAM Security in the Cloud
A look at how IAM works and how CIEM enhances IAM security in the cloud....
Tenable Cyber Watch: Controllo del metaverso, protezione di AI e ML, minaccia di Daixin per gli ospedali e passaggio a piattaforme informatiche integrate
To help you zap those Monday blahs, here’s a caffeinated shot of cyber news you can use: Police chiefs must get hip to the metaverse. CISOs are shifting to integrated cybersecurity platforms. There's new guidance for securing ML and AI systems. Hospitals face a ransomware threat from the Daixin cybe...
Cybersecurity Snapshot: Truffe di phishing, dinamiche evolutive di mercato, rischi del metaverso, sondaggio Log4J
Get the latest on worrisome phishing stats; businesses’ embrace of the metaverse, come what may; a (small) improvement in CISO job stability; the compensation cost of security leaders; and more!...
Il Patch Tuesday di Microsoft di dicembre 2022 risolve 48 CVE (CVE-2022-44698)
Microsoft addresses 48 CVEs including two zero-day vulnerabilities, one that has been exploited in the wild (CVE-2022-44698) and one that was publicly disclosed prior to a patch being available (CVE-2022-44710)....
CVE-2022-27518: RCE non autenticato in Citrix ADC e Gateway
Citrix has patched a critical remote code execution vulnerability in its Gateway and ADC products. This vulnerability has reportedly been exploited as a zero day; organizations should patch urgently....
Come valutare la preparazione alla sicurezza informatica dei fornitori di servizi IT e dei fornitori dei servizi gestiti (MSP)
Improperly evaluating the cybersecurity capabilities of prospective IT service providers and managed service providers (MSPs) can put your organization's data and systems at risk. A new guide from CompTIA can help you ask the right questions....
CVE-2022-42475: Fortinet patch Zero Day in FortiOS SSL VPN
Fortinet has patched a zero day buffer overflow in FortiOS that could lead to remote code execution. There has been a report of active exploitation and organizations should patch urgently....
Che cosa succede quando il metaverso entra nella tua superficie di attacco?
Tenable polled 1,500 cybersecurity, IT and DevOps professionals about their top concerns in the nascent virtual reality worlds of the metaverse. Here's what we found out....
Tenable Cyber Watch: sfide "shift left", tentativi anti-ransomware, i rischi quantistici e l'ansia del CISO
Beat the Monday blues with cyber news you can use | Shift-left efforts falling short. The White House’s war on ransomware. Everything you’ve ever wanted to know about CISOs. The quantum computing risk for critical infrastructure. Don’t miss the latest episode of the Tenable Cyber Watch. The weekl...
Cybersecurity Snapshot: anniversario di Log4j, rischi CI/CD, infostealer, attacchi via e-mail, sicurezza OT
Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! ...
Cloud Security: 5 Key Takeaways from the SANS DevSecOps Survey
A recent SANS Institute report finds that DevSecOps teams are improving their tooling, processes and techniques, but their organizations’ increasingly hybrid and multi-cloud IT environments are getting harder to secure. Check out key highlights from the “SANS 2022 DevSecOps Survey.”...
Are You Ready for the Next Log4Shell? Tenable’s CSO and CIO Offer Their Advice
Tenable CIO Patricia Grant and CSO Robert Huber share insights and best practices to help IT and cybersecurity leaders and their teams weather the next cyber crisis of Log4j proportions....