Cybersecurity Snapshot: As AI Worries Spike, Experts Send Secure AI Advice to the White House, Capitol Hill
Learn all about the recommendations the NAIAC made to the U.S. government for responsible AI. Plus, employees go gaga over ChatGPT, while cyber teams get tasked with securing it. Also, we look at cloud IAM challenges and how to tackle them. And much more!
The Default Toxic Combination of GCP Compute Engine Instances
By default, compute instances in GCP are prone to a toxic combination that you should be aware of, and can avoid and fix.
الأمن البحري للتكنولوجيا التشغيلية: أمطار عاصفة أم إبحار سلس؟
The maritime industry is navigating a sea of change when it comes to cybersecurity. The interconnected vessels and new technologies enabling the shipping world to become more efficient also introduce cyber risk. Here's what you need to know about the challenges and risks these floating cities face …
How Exposure Management Can Make Pen Testing More Effective
Pen testing needs to be supplemented with a routine vulnerability scanning schedule to pick up changes that may introduce vulnerabilities over time, to improve efficiencies in the overall process and to reduce the overhead costs in the penetration testing process.
طريقة عملية لتقليل المخاطر في منطقة الإنتاج
هناك الكثير من الصخب حول الأمن الإلكتروني لمنطقة الإنتاج في مجال التصنيع، ولكن من أين تبدأ؟ دعونا نُبسط الأمر ونتطرق إلى سبب قيام المهاجمين بما يفعلونه وما يمكنك فعله لإيقافهم. يتعلق الأمر برمته بتقليل المخاطر، ومضاعفة جهودك لتحقيق أفضل النتائج. Read on to learn…
CVSSv4 قريبًا: ما يحتاج محترفو الأمن إلى معرفته
The latest revision of the industry standard for ranking vulnerabilities has some changes that practitioners will find useful. Here, we'll discuss them, as well as Tenable' plans to implement the scoring system in its products.
مشاهدة Tenable Cyber: تحذر Verizon DBIR من BEC وفيروسات الفيدية، وأمن السحابة يتصدر مخاوف CISOs، والمزيد
This week’s edition of the Tenable Cyber Watch unpacks Verizon’s DBIR 2023 report and its warnings about the rise in BEC scams and ransomware attacks and addresses the greatest areas of concerns for cybersecurity leaders. Also covered: why app stores may soon be required to disclose their apps’…
CVE-2023-33299: ثغرة أمنية حرجة لتنفيذ التعليمات البرمجية عن بُعد في FortiNAC
Fortinet has released a patch fixing a remote code execution vulnerability in several versions of FortiNAC
Cybersecurity Snapshot: بصفتك Feds Hunt CL0P Gang، تعرف على نصائح حول الاستجابة لفيروس الفيديو وإدارة السحابة الآمنة وخصوصية بيانات التطبيقات السحابية
Learn all about the U.S. government’s reward for CL0P ransomware leads. Plus, check out ransomware incident response recommendations. Also, review concrete guidance on cloud system administration and on designing cloud apps with privacy by default. And much more!
Shared Responsibility Model in the Cloud
CSPs have embraced a shared responsibility model to define the security responsibilities for different components of the architecture.
مشاهدة Tenable Cyber: U.S. دليل التحديثات الحكومية بشأن فيروسات الفيدية ودراسة Lineaje تكشف عن مخاطر سلسلة التوريد في OSS والمزيد
This week’s edition of the Tenable Cyber Watch unpacks the most recent updates to the U.S. government’s #StopRansomware Guide and addresses the steps organizations can take to boost digital trust. Also covered: why companies must be careful when using open source software.
FAQ for MOVEit Transfer Vulnerabilities and CL0P Ransomware Gang
Frequently asked questions relating to vulnerabilities in MOVEit Transfer, including one that was exploited by the prolific CL0P ransomware gang.