Blog di Tenable
Applying Tenable’s Risk-based Vulnerability Management to the Australian Cyber Security Centre's Essential Eight

Come estrarre dati e valore dalla soluzione EASM di Tenable
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how Tenable.asm’s various data-extraction capabilities can help you operationalize your EASM data....
Tenable Cyber Watch: IoT Vendors Lack Vulnerability Disclosures, Cyber Ranks As Top Business Concern - Again, The GAO’s Frustrations with Federal Agencies Not Heeding their Cybersecurity Advice
This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the GAO's frustrations with federal agencies not heeding their cybersecurity advice and provides guidan...
Cybersecurity Snapshot: Mentre infuria il fuoco della polemica attorno a ChatGPT, il NIST emette una guida alla sicurezza dell'AI
Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read about how employee money-transfer scams are on the upswing. And much more!...
È ora che il governo degli Stati Uniti aiuti l'Africa a rafforzare la propria sicurezza informatica
African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. ...
How Attackers Can Exploit GCP’s Multicloud Workload Solution
A deep dive into the inner workings of GCP Workload Identity Federation, taking a look at risks and how to avoid misconfigurations....
ProxyNotShell, OWASSRF, TabShell: applica ora la patch ai tuoi server Microsoft Exchange
Several flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as part of ransomware and targeted attacks against organizations that have yet to patch their systems. Patching the flaws outlined below is strongly recommended....
Tenable Cyber Watch: che cosa pensano i CISO del loro lavoro, perché gli sviluppatori hanno delle difficoltà con la sicurezza, utilizzare l'intelligenza artificiale per diminuire i rischi
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the communication pitfalls that hold security leaders back. Ever wonder how happy your CISO is at ...
Sandworm APT implementa il nuovo SwiftSlicer Wiper utilizzando i criteri di gruppo di Active Directory
Sandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a new wiper, SwiftSlicer....
Cybersecurity Snapshot: I fornitori di IoT falliscono nelle rivelazioni di vulnerabilità, mentre le minacce informatiche continuano a rappresentare i principali rischi aziendali
Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity awareness programs. Then scan the latest list of top malware. And much more!...