Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

January 16, 2023

Microsoft Azure Virtual Machines: Public IP Configuration Is Not Always As It Seems

If you’re not familiar enough with the SKU attribute of the Azure public IP address, you may think you’re configuring your virtual machines as public to the internet … but you aren’t....


January 13, 2023

Cybersecurity Snapshot: الحكومة الأمريكية تضغط بقوة لتسريع إخطارات عمليات الاختراق، في حين لا تزال المخاوف الإلكترونية تُعيق القيمة السحابية

Learn all about the FCC’s plan to accelerate telecom breach reports. Plus, why cyber worries remain a cloud obstacle. Also, find out how to rate your cloud MSP’s cybersecurity strength. Then check out our ad-hoc poll on cloud security. And much more!...


January 12, 2023

جوجل: رصد التحديات الناشئة في مجال أمان السحابة في عام 2023

A new report from Google outlines a set of evolving threats that cloud security teams should keep an eye on in the new year....


January 9, 2023

Tenable Cyber Watch: البيانات الرئيسية لعام 2022 فيما يتعلق بأمان السحابة، وإدارة الثغرات الأمنية، وإدارة سطح الهجوم الخارجي، وأمان تطبيقات الويب، والمزيد

It's that time again! Time to grab another cup of coffee and tune into this week's episode of the Tenable Cyber Watch newscast, the weekly video news digest that helps you zero-in on the things that matter right now in cybersecurity. As she does every Monday, Tenable Cyber Watch host Jirah Mickle...


January 8, 2023

Why JIT Access is an Essential Part of Cloud Security

Automating JIT in the cloud is win-win for improving security and business productivity -- and cracks a nut that PAM can’t....


January 6, 2023

Cybersecurity Snapshot: اكتشاف المهارات الإلكترونية الأكثر قيمة، والاتجاهات الأساسية لأمان السحابة، والأثر العميق للأعمال التجارية بالوسائط الإلكترونية

Happy New Year! Learn all about the cybersecurity expertise that employers value most; Google Cybersecurity Action Team’s latest take on cloud security trends; a Deloitte report on cybersecurity’s growing business influence; a growth forecast for cyber spending; and more!...


January 5, 2023

CVE-2022-47523: الثغرة الأمنية SQL Injection في ManageEngine Password Manager Pro، وPAM360، وAccess Manager Plus

Zoho patches a newly disclosed high-severity SQL injection flaw in several ManageEngine products; attackers have historically targeted several ManageEngine products over the last three years....


January 3, 2023

رؤية المجهول: فهم إدارة سطح الهجوم الخارجي وكيف يمكنها المساعدة

External attack surface management (EASM) is difficult and oftentimes confusing, especially in a world of poor inventory controls and a growing attack surface. This blog discusses what's required to do EASM successfully....


January 2, 2023

Tenable Cyber Watch: ماذا يتوقع خبراؤنا في عام 2023؟

Banish the post-holiday blues with news you can use: this week's episode of Tenable Cyber Watch takes a look at four cybersecurity trends to watch for 2023. Learn how extortion tactics will reshape ransomware, OT security, SaaS worries and protecting the cloud are top of mind for our experts....


December 30, 2022

Cybersecurity Snapshot: البيانات الرئيسية لعام 2022 فيما يتعلق بأمان السحابة، وإدارة الثغرات الأمنية، وإدارة سطح الهجوم الخارجي، وأمان تطبيقات الويب، والمزيد

As 2022 ends, we highlight important data points that shine a light on the trends, challenges and best practices that matter to cybersecurity leaders eager to boost their exposure management and reduce their organizations’ cyber risk. ...


December 29, 2022

CVE-2022-47939: ثغرة أمنية حرجة في تنفيذ التعليمات البرمجية عن بُعد في نظام التشغيل Linux Kernel

A critical remote code execution vulnerability in the Linux kernel has been publicly disclosed by Trend Micro's Zero Day Initiative in its ZDI-22-1690 advisory. The vulnerability has been given a CVSSv3 of 10.0. There are no reports of active exploitation....


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

Apache Log4j Flaw Puts Third-Party Software in the Spotlight

Get the Details >