Tenable blog
Cybersecurity Snapshot: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

تقديم ExposureAI في Tenable One: تعرف على مستقبل الأمن الإلكتروني الوقائي
The Tenable One Exposure Management Platform is already transforming how organizations practice preventive cybersecurity. Now, with the introduction of ExposureAI, users can unleash the full potential of generative artificial intelligence to stay one step ahead of attackers....
Secure Your AWS EC2 Instance Metadata Service (IMDS)
Read this review of IMDS, an important AWS EC2 service component, to understand its two versions and improve your AWS security....
يعالج تصحيح Microsoft لشهر أغسطس 2023 الموافق يوم الثلاثاء 73 مشكلة من نقاط الضعف والتعرض (CVE)(CVE-2023-38180)
Microsoft addresses 73 CVEs, including one vulnerability exploited in the wild....
إدارة كلمة المرور والمصادقة أفضل الممارسات
Attackers are always looking for new ways to crack passwords and gain access to sensitive information. Keeping passwords secure is a challenging, yet critical task. Read this blog to learn several best practices for password management and authentication so you can keep your environment safe....
مشاهدة Tenable Cyber: هيئة الأوراق المالية والبورصة تصدر قواعد جديدة للإفصاح الإلكتروني، وأخطر نقاط الضعف في برامج MITRE، والمزيد
This week’s edition of Tenable Cyber Watch unpacks the new cybersecurity disclosures rules from the U.S. Securities and Exchange Commission and looks at MITRE’s list of the most dangerous software weaknesses. Also covered: Cloud adoption by financial institutions continues to increase. What one stud...
Cybersecurity Snapshot: ماذا يقلقني؟تتبنى الشركات الذكاء الاصطناعي التوليدي، وتتخلص من المخاطر الأمنية
Seduced by generative AI’s potential, organizations plunge ahead overlooking its pitfalls. Plus, check out a common flaw that puts web app data at risk. Also, why many zero day bugs last year were variants of known vulnerabilities. Moreover, find out the current cost of a data breach – ouch! And muc...
Avoiding the Security Potluck: Good Governance Helps You from Code to Cloud
What's involved in shifting cloud security responsibilities to the app development team with governance by the security team?...
AA23-215A: 2022's Top Routinely Exploited Vulnerabilities
A joint Cybersecurity Advisory collaborated on by multiple international agencies highlights the top routinely exploited vulnerabilities of 2022....
CNAPPgoat: The Multicloud Open-Source Tool for Deploying Vulnerable-by-Design Cloud Resources
Here’s all you need to know about CNAPPgoat, our open-source project designed to modularly provision vulnerable-by-design components in cloud environments....