Cybersecurity Snapshot: North Korea’s Cyber Spies Hunt for Nuclear Secrets, as Online Criminals Ramp Up AI Use in the EU
Check out a CISA-FBI advisory about North Korean cyber espionage on critical infrastructure orgs. Plus, what Europol found about the use of AI for cybercrime. Meanwhile, the risk concerns that healthcare leaders have about generative AI. And a poll on water plant cybersecurity. And much more!
ConfusedFunction: A Privilege Escalation Vulnerability Impacting GCP Cloud Functions
Organizations that have used Google Cloud Platform’s Cloud Functions – a serverless execution environment – could be impacted by a privilege escalation vulnerability discovered by Tenable and dubbed as “ConfusedFunction.” Read on to learn all about the vulnerability and what your organization needs…
Tenable’s Software Update Process Protects Customers’ Business Continuity with a Safe, Do-No-Harm Design
With the unprecedented tech outages experienced by so many of our customers over the last week, we recognize the need for deeper understanding of our software development processes and how they support global business continuity. In this blog post, we’ll outline how Tenable’s comprehensive approach…
إذا كان لديك خمس دقائق فقط، فإليك CNAPP (منصة حماية التطبيقات السحابية الأصلية) في لمح البصر (ولدينا كتاب إلكتروني أيضًا)
إذا شعرت بالحيرة بعض الشيء بسبب الحديث الكثير عن منصات حماية التطبيقات السحابية الأصلية (CNAPPs)، فلا تقلق. Our new eBook “Empower Your Cloud: Mastering CNAPP Security” explains in plain English what CNAPP is, how it works and why it’ll help you secure your cloud environment confidently. Read…
تحسين أمان السحابة باستخدام JIT Access لتطبيقات SaaS الحساسة
Using just-in-time controls to secure access to your SaaS applications will reduce your cloud attack surface by avoiding permanent access and enforcing least privilege.
How To Do a Security Audit of Pimcore Enterprise Platform
Our new research paper gives you a roadmap for using Pimcore's features while preserving security.
Tenable Customer Update about CrowdStrike Incident
Please read this important customer update about CrowdStrike's recent incident.
Cybersecurity Snapshot: CISA Breaks Into Agency, Outlines Weak Spots in Report, as Cloud Security Alliance Updates Cloud Sec Guidance
CISA’s red team acted like a nation-state attacker in its assessment of a federal agency’s cybersecurity. Plus, the Cloud Security Alliance has given its cloud security guidance a major revamping. Meanwhile, a Google report puts a spotlight on insecure credentials. And the latest on open source…
Tenable Announces Former Senior Administration Officials to Inaugural Public Sector Advisory Board
Rob Joyce and Mark Weatherford will help Tenable shape federal cyber and AI policy
Oracle July 2024 Critical Patch Update Addresses 175 CVEs
Oracle addresses 175 CVEs in its third quarterly update of 2024 with 386 patches, including 26 critical updates.
Cybersecurity Snapshot: CISA Tells Tech Vendors To Squash Command Injection Bugs, as OpenSSF Calls on Developers To Boost Security Skills
Check out CISA’s call for weeding out preventable OS command injection vulnerabilities. Plus, the Linux Foundation and OpenSSF spotlight the lack of cybersecurity expertise among SW developers. Meanwhile, GenAI deployments have tech leaders worried about data privacy and data security. And get the…
كيف تعمل إدارة الثغرات الأمنية القائمة على المخاطر على تعزيز وضع الأمان في بيئة تكنولوجيا المعلومات الحديثة لديك
وقد تبدو عمليات تقييم الثغرات الأمنية وإدارة الثغرات الأمنية متشابهة - ولكنها ليست كذلك. As a new Enterprise Strategy Group white paper explains, it’s key to understand their differences and to shift from ad-hoc vulnerability assessments to continuous, risk-based vulnerability management (RBVM)…