Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

September 18, 2023

مشاهدة Tenable Cyber: الولايات المتحدةحث صناعة الفضاء على البقاء يقظة، وتصبح الوظائف السيبرانية أكثر صرامة، والمزيد

This week’s edition of Tenable Cyber Watch unpacks safeguarding the US space industry and addresses why many cyber pros feel their jobs have gotten more difficult. Also covered: Three quantum-resistant algorithms that can protect data from quantum computer attacks....


September 15, 2023

Cybersecurity Snapshot: اطلع على أحدث تهديدات Deepfake، والمخاطر مفتوحة المصدر، وأمن نظام الذكاء الاصطناعي، وعصابات فيروس الفدية

Tasked with securing your org’s new AI systems? Check out a new Google paper with tips and best practices. Plus, open source security experts huddled at a conference this week – find out what they talked about. Also, Uncle Sam says it’s time to prep for deepfake attacks. And much more!...


September 12, 2023

شراكة Tenable وCyversity في برنامج إعداد امتحان CISSP

Tenable is now accepting applicants for its training scholarship dedicated to supporting cybersecurity professionals from diverse backgrounds in their preparation for the CISSP exam Diversity, equity and inclusion (DEI) is a priority at Tenable. We strive to be a career destination in which individ...


September 12, 2023

مشاهدة Tenable Cyber: قادة الإنترنت يعطون الأولوية للاكتشاف والوقاية، وأهم 3 برامج ضارة في الربع الثاني، والمزيد

This week’s edition of Tenable Cyber Watch unpacks security leaders' top cybersecurity priorities and addresses why software products must be secure by design. Also covered: The top 3 malware in Q2. ...


September 12, 2023

كيفية إجراء تقييمات فعالة للثغرات الأمنية باستخدام Tenable

Policy configuration choices in vulnerability assessment tools like Tenable Nessus, Tenable Security Center and Tenable Vulnerability Management enable security professionals to effectively gather data that can be analyzed to aid in prioritizing remediation....


September 11, 2023

CVE-2023-20269: تم الإبلاغ عن استغلال ثغرة أولية مباغتة (Zero-Day) في جهاز أمان Cisco Adaptive وFirepower Threat Defense من قبل مجموعات فيروس الفيدية

Ransomware groups including LockBit and Akira are reportedly exploiting a zero-day vulnerability in Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) appliances with VPN functionality enabled....


September 11, 2023

The Azure Metadata Protection You Didn’t Know Was There

Some Azure services have an additional, not widely known, protection mechanism against session token exfiltration....


September 8, 2023

Cybersecurity Snapshot: يُفرض على محترفي الإنترنت ضرائب بسبب العمل الزائد ونقص الموظفين ونقص الدعم، حيث يؤثر الإجهاد سلبًا

Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Check out what a study found. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. Plus, the U.S. government is alerting about exploits to CVE-2022-47966 and CVE-2022-42475. We als...


September 7, 2023

AA23-250A: يستغل العديد من الجهات المهددة التي تهدد الدولة القومية CVE-2022-47966 وCVE-2022-42475

A joint Cybersecurity Advisory examines the exploitation of two critical vulnerabilities by nation-state threat actors....


September 7, 2023

ستعمل خطة Tenable للاستحواذ على Ermetic على تسريع قيمة العملاء في CNAPP وإدارة التعرض للمخاطر

The acquisition of cloud security innovator Ermetic, once completed, will add unified, elegantly integrated CNAPP and market-leading CIEM capabilities to the Tenable portfolio....


September 6, 2023

رحلة إلى أعباء العمل المضمنة:المخاطر الأمنية وكيفية تفاديها باستخدام Tenable Cloud Security

Tenable Cloud Security now includes built-in container security functionality, so you can detect and prevent insecure containers from being deployed to production. In this blog, you’ll learn how Tenable can help you avoid critical container security mistakes. ...


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >