الاتجاهات التي يمكن أن تُشكل أمن التكنولوجيا التشغيلية في عام 2024
Discover the transformative shifts reshaping Operational Technology (OT) security in an evolving threat landscape....
Cybersecurity Snapshot: Want to Deploy AI Securely? New Industry Group Will Compile AI Safety Best Practices
A group that includes the Cloud Security Alliance, CISA and Google is working to compile a comprehensive collection of best practices for secure AI use. Meanwhile, check out a draft of secure configuration recommendations for the Google Workspace suite. Plus, MITRE plans to release a threat model fo...
الأطفال ليسوا بخير: كشفت الثغرات الأمنية في بوابة Edulog عن بيانات موقع الطالب من الروضة إلى الصف الثاني عشر
Tenable Research discovered security flaws in a popular transportation management app that allowed access to student location data. While these issues have been fixed, the findings again prove the importance of strong authentication and access control....
مراجعة Microsoft Patch Tuesday 2023 Year
Microsoft addressed over 900 CVEs as part of Patch Tuesday releases in 2023, including over 20 zero-day vulnerabilities....
تحديث Patch Tuesday لشهر ديسمبر 2023 من شركة Microsoft يُعالج 33 ثغرة أمنية وحالة تعرض للمخاطر شائعة (CVE-2023-36019)
Microsoft addresses 33 CVEs in its December 2023 Patch Tuesday release, with no zero-day vulnerabilities disclosed this month....
مشاهدة Tenable Cyber: نقص المهارات الإلكترونية في عام 2023، والمهارات التقنية الإلكترونية الأكثر طلبًا في عام 2023، والمزيد
This week edition of Tenable Cyber Watch unpacks the 2023 cyber skills shortage and addresses the most sought-after cyber skills in 2023. Also covered: The most in-demand cybersecurity jobs from 2023 according to COMPTIA's "State of the Tech Workforce Report." Why did CISA urge AI vendors to ap...
كيفية التعامل مع تحديات التكنولوجيا التشغيلية:جرد الأصول وتقييم الثغرات الأمنية
The plurality of devices and protocols found in operational technology (OT) environments makes asset discovery and remediation a challenge. Here’s how Tenable OT Security can help....
Cybersecurity Snapshot: تدعو CISA صانعي البرامج إلى استخدام لغات آمنة للذاكرة، حيث يصدر OpenSSF مبادئ البرامج الآمنة
CISA is urging developers to stamp out memory vulnerabilities with memory safe programming languages. Meanwhile, the OpenSSF published 10 key principles for secure software development. Plus, malware used in fake browser-update attacks ballooned in Q3. In addition, a new program aims to boost the cy...
CVE-2023-4966 (CitrixBleed): أوقف الجلسات النشطة أو المستمرة لمنع المزيد من الحلول الوسط
Patching CitrixBleed isn’t enough; organizations need to invalidate active or persistent session tokens as the these tokens can be used to compromise networks and bypass authentication measures including multifactor authentication...
مشاهدة Tenable Cyber: تصدر CSA شهادة Zero Trust، وتحدث CISA نموذج شهادة الأمان، والمزيد
This week’s edition of Tenable Cyber Watch unpacks CISA’s Security Attestation Form Draft and discusses CSA’s new Zero Trust Certification. Also covered: The FCC’s new pilot program that would help U.S. schools and libraries boost their cybersecurity. ...
Cybersecurity Snapshot: الولايات المتحدة، المملكة المتحدةتوفر الحكومات النصائح حول كيفية بناء أنظمة ذكاء اصطناعي آمنة
Looking for guidance on developing AI systems that are safe and compliant? Check out new best practices from the U.S. and U.K. cyber agencies. Plus, a new survey shows generative AI adoption is booming, but security and privacy concerns remain. In addition, CISA is warning municipal water plants abo...
يمكنك زيادة قيمة فحص الثغرات الأمنية إلى الحد الأقصى من خلال الفحص المعتمد
Want to get a lot more value out of your vulnerability scans? Start doing authenticated scanning...