What Security Leaders Need to Know About Security End of Life: How Tenable is Leading the Way
Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers.
تقرير مشهد التهديدات لعام 2022 من Tenable: تقليل التعرض من خلال معالجة الثغرات الأمنية المعروفة
Tenable’s annual analysis of the security and threat landscape offers guidance to help security professionals navigate the expanding attack surface.
عدم القدرة على إصلاح كل شيء: كيفية تبني نهج واعٍ بالمخاطر لمعالجة الثغرات الأمنية
Frameworks and standards for prioritizing vulnerability remediation continue to evolve, yet far too many organizations rely solely on CVSS as their de facto metric for exposure management. Here, we discuss other important frameworks and provide guidance on how Tenable can help.
أثر تحديث Patch Tuesday على الأمن الإلكتروني على مر السنين
Dive into the history of Patch Tuesday and learn how it continues to influence the ways security teams manage patches.
ماذا يحدث عند دخول منصة Metaverse سطح الهجوم الخاص بك؟
Tenable polled 1,500 cybersecurity, IT and DevOps professionals about their top concerns in the nascent virtual reality worlds of the metaverse. Here's what we found out.
NETGEAR Router Misconfiguration Opens The Door For Remote Attacks
Tenable Research has discovered a configuration issue impacting NETGEAR Nighthawk WiFi6 Routers commonly used in small offices and large homes. Organizations need to manually apply firmware updates.
Cloud Security Basics: Protecting Your Web Applications
While cloud computing providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure offer robust and scalable services, securing your cloud environment brings its own unique challenges. You can reduce risk by addressing these eight common cloud security…
Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021
International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. We identified vulnerabilities associated with these strains.
The Ransomware Ecosystem: In Pursuit of Fame and Fortune
The key players within the ransomware ecosystem, including affiliates and initial access brokers, work together cohesively like a band of musicians, playing their respective parts as they strive for fame and fortune.
وقحة، وساذجة، وغير منطقية: التعرف على مجموعة الابتزاز LAPSUS$
نظرًا لأنها حظيت باهتمام الصناعة في الأشهر الأولى من عام 2022، باتت مجموعة LAPSUS$ لا تحرك ساكنًا إلى حد بعيد. ما الدروس المستفادة من قصة مجموعة الابتزاز هذه والتكتيكات الخاصة بها؟
Securing Critical Infrastructure: What We've Learned from Recent Incidents
Learn about well-known vulnerabilities and attacks and how they affected critical infrastructure —from Phone Phreaking to recent ransomware.
فهم نظام فيروس الفيدية: من مجرمين متخصصين في قفل الشاشة إلى مؤسسة إجرامية بملايين الدولارات
يُعد فيروس الفدية تهديدًا إلكترونيًا متطورًا باستمرار، ومن خلال تطوره تمكن فيروس الفدية من النجاة والازدهار.