Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

August 18, 2023

Cybersecurity Snapshot: يوضح دليل CIS كيفية الوصول إلى مؤسسة أمان إلكتروني بأسعار معقولة

The Center for Internet Security unpacks how to establish foundational cyber hygiene at a reasonable cost. Plus, the Cyber Safety Review Board issues urgent security recommendations on its Lapsus$ report – and announces it’ll next delve into cloud security. Moreover, are humans or AI better at…


August 17, 2023

The Next Step in the IMDSv1 Redemption Journey

Learn about AWS’s new open source library for enforcing IMDSv2 and Tenable Cloud Security’s new lab for trying it out.


August 14, 2023

تولت Tenable الراية عام 2023: والفائزون هم...

It's time to crown the winners of this year's Capture the Flag Event!


August 14, 2023

مشاهدة Tenable Cyber: مقتطفات مهمة من Black Hat USA، تصدر SANS تقرير 2023 حول الوعي الأمني، والمزيد

This week’s edition of Tenable Cyber Watch dishes out five hot takes from Black Hat USA and provides guidance on how to better mitigate shadow IT risks. Also covered: How you can boost your security awareness program.


August 11, 2023

Cybersecurity Snapshot: الولايات المتحدةلمنح الملايين في مسابقة AI Cyber Tool، بينما يقوم NIST بتجديد إطار عمل الأمن الإلكتروني

Got an idea for a new AI-based cybersecurity product? You could win millions in a new contest. Meanwhile, NIST has drafted a major revision to the CSF 2.0 and wants your opinion about it. Also, there’s a new free tool that flags security flaws in public AI models. Plus, most cloud breaches are…


August 9, 2023

تقديم ExposureAI في Tenable One: تعرف على مستقبل الأمن الإلكتروني الوقائي

The Tenable One Exposure Management Platform is already transforming how organizations practice preventive cybersecurity. Now, with the introduction of ExposureAI, users can unleash the full potential of generative artificial intelligence to stay one step ahead of attackers.


August 8, 2023

Secure Your AWS EC2 Instance Metadata Service (IMDS)

Read this review of IMDS, an important AWS EC2 service component, to understand its two versions and improve your AWS security.


August 8, 2023

إدارة كلمة المرور والمصادقة أفضل الممارسات

Attackers are always looking for new ways to crack passwords and gain access to sensitive information. Keeping passwords secure is a challenging, yet critical task. Read this blog to learn several best practices for password management and authentication so you can keep your environment safe.


August 7, 2023

مشاهدة Tenable Cyber: هيئة الأوراق المالية والبورصة تصدر قواعد جديدة للإفصاح الإلكتروني، وأخطر نقاط الضعف في برامج MITRE، والمزيد

This week’s edition of Tenable Cyber Watch unpacks the new cybersecurity disclosures rules from the U.S. Securities and Exchange Commission and looks at MITRE’s list of the most dangerous software weaknesses. Also covered: Cloud adoption by financial institutions continues to increase. What one…


August 4, 2023

Cybersecurity Snapshot: ماذا يقلقني؟تتبنى الشركات الذكاء الاصطناعي التوليدي، وتتخلص من المخاطر الأمنية

Seduced by generative AI’s potential, organizations plunge ahead overlooking its pitfalls. Plus, check out a common flaw that puts web app data at risk. Also, why many zero day bugs last year were variants of known vulnerabilities. Moreover, find out the current cost of a data breach – ouch! And…


August 3, 2023

Avoiding the Security Potluck: Good Governance Helps You from Code to Cloud

What's involved in shifting cloud security responsibilities to the app development team with governance by the security team?


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >

× الاتصال بفريق المبيعات