Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

October 28, 2025

Security for AI: A Practical Guide to Enforcing Your AI Acceptable Use Policy

An AI acceptable use policy can help your organization mitigate the risk of employees accidentally exposing sensitive data to public AI tools. Benchmark your organization’s policy against our best practices and discover how prompt-level visibility from Tenable AI Exposure eases policy enforcement.

March 22, 2024

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Check out the NSA’s 10 key best practices for securing cloud environments. Plus, learn how cloud native computing could help streamline your AI deployments. Meanwhile, don’t miss the latest about cyberthreats against water treatment plants and critical infrastructure in general. And much more!


March 21, 2024

FlowFixation: الثغرة الأمنية للاستيلاء على خدمة AWS Apache Airflow ولماذا يؤدي إهمال حواجز الحماية إلى تعريض مقدمي خدمات الاتصالات الرئيسيين للخطر

Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of…


March 20, 2024

كيفية تأمين أصول تكنولوجيا المعلومات والتكنولوجيا التشغيلية وإنترنت الأشياء لديك باستخدام منصة إدارة التعرض للمخاطر: رؤية كاملة مع جرد الأصول واكتشافها

اكتشف كيف يساعد Tenable One للتكنولوجيا التشغيلية/إنترنت الأشياء المؤسسات على البقاء في المقدمة في مشهد التهديدات المتطور اليوم من خلال الحصول على الرؤية الشاملة وتحديد أولويات المخاطر الإلكترونية عبر تكنولوجيا المعلومات والتكنولوجيا التشغيلية وإنترنت الأشياء.


March 19, 2024

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters…


March 19, 2024

لن تؤثر تأخيرات قاعدة بيانات الثغرات الأمنية الوطنية (NVD) الأخيرة على عملاء Tenable Vulnerability Management بفضل مصادر الدرجات المتنوعة لدينا

NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable Vulnerability Management customers because our vulnerability scoring is based on multiple sources.


March 18, 2024

Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment

Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. However, security standards have failed to keep pace, leading to increased risk of cyberattacks and data breaches for insecure or misconfigured platforms. Here we examine the challenges…


March 18, 2024

Identifying Web Cache Poisoning and Web Cache Deception: How Tenable Web App Scanning Can Help

Web cache poisoning and web cache deception are two related but distinct types of attacks that can have serious consequences for web applications and their users. Learn how these flaws arise, why some common attack paths are so challenging to mitigate and how Tenable Web App Scanning can help.


March 15, 2024

Cybersecurity Snapshot: CISA Shines Light on Cloud Security and on Hybrid IAM Systems’ Integration

Check out CISA’s latest best practices for protecting cloud environments, and for securely integrating on-prem and cloud IAM systems. Plus, catch up on the ongoing Midnight Blizzard attack against Microsoft. And don’t miss the latest CIS Benchmarks. And much more!


March 14, 2024

CVE-2023-48788: ثغرة أمنية خطيرة في Fortinet FortiClientEMS SQL Injectio

Fortinet warns of a critical SQL Injection vulnerability that could allow an unauthenticated attacker to execute arbitrary code on vulnerable FortiClientEMS software.


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.

نظرة على نظام فيروس الفيدية

تنزيل التقرير >

× الاتصال بفريق المبيعات