Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

March 24, 2026

Meet Tenable Hexa AI: Agentic AI for exposure management

Meet Tenable Hexa AI: the agentic engine of the Tenable One Exposure Management Platform. Learn how Tenable Hexa AI automates complex security workflows and transforms exposure intelligence into coordinated action to help your security team meaningfully reduce cyber risk.

April 5, 2024

Cybersecurity Snapshot: CSRB Calls Exchange Online Hack “Preventable,” While CISA, Others Warn About XZ Utils Backdoor Vulnerability

Check out why the Cyber Safety Review Board has concluded that the Microsoft Exchange Online breach “should never have occurred.” Plus, warnings about the supply chain attack against the XZ Utils open source utility are flying. In addition, a report says ransomware attacks surged in February. And…


March 29, 2024

Frequently Asked Questions About CVE-2024-3094, A Backdoor in XZ Utils

Frequently asked questions about CVE-2024-3094, a supply-chain attack responsible for a backdoor in XZ Utils, a widely used library found in multiple Linux distributions.


March 29, 2024

Cybersecurity Snapshot: الولايات المتحدةGov’t Unpacks AI Threat to Banks, as NCSC Urges OT Teams to Protect Cloud SCADA Systems

Check out new guidance for banks on combating AI-boosted fraud. Plus, how to cut cyber risk when migrating SCADA systems to the cloud. Meanwhile, why CISA is fed up with SQLi flaws. And best practices to prevent and respond to DDoS attacks. And much more!


March 25, 2024

تعزيز الأمن الإلكتروني للنقل وإدارة الأسطول لوزارة الدفاع

Few things can halt operations across the Department of Defense like a critical failure of logistics and transportation. From automated asset inventory to malicious-activity detections through baselining, learn how Tenable OT Security can protect these critical functions within the DoD and work…


March 22, 2024

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Check out the NSA’s 10 key best practices for securing cloud environments. Plus, learn how cloud native computing could help streamline your AI deployments. Meanwhile, don’t miss the latest about cyberthreats against water treatment plants and critical infrastructure in general. And much more!


March 21, 2024

FlowFixation: الثغرة الأمنية للاستيلاء على خدمة AWS Apache Airflow ولماذا يؤدي إهمال حواجز الحماية إلى تعريض مقدمي خدمات الاتصالات الرئيسيين للخطر

Tenable Research discovered a one-click account takeover vulnerability in the AWS Managed Workflows Apache Airflow service that could have allowed full takeover of a victim’s web management panel of the Airflow instance. The discovery of this now-resolved vulnerability reveals a broader problem of…


March 20, 2024

كيفية تأمين أصول تكنولوجيا المعلومات والتكنولوجيا التشغيلية وإنترنت الأشياء لديك باستخدام منصة إدارة التعرض للمخاطر: رؤية كاملة مع جرد الأصول واكتشافها

اكتشف كيف يساعد Tenable One للتكنولوجيا التشغيلية/إنترنت الأشياء المؤسسات على البقاء في المقدمة في مشهد التهديدات المتطور اليوم من خلال الحصول على الرؤية الشاملة وتحديد أولويات المخاطر الإلكترونية عبر تكنولوجيا المعلومات والتكنولوجيا التشغيلية وإنترنت الأشياء.


March 19, 2024

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection. The capabilities offer powerful means for securing your clusters…


March 19, 2024

لن تؤثر تأخيرات قاعدة بيانات الثغرات الأمنية الوطنية (NVD) الأخيرة على عملاء Tenable Vulnerability Management بفضل مصادر الدرجات المتنوعة لدينا

NIST has announced delays in the CVE enrichment process of its National Vulnerability Database (NVD), but the situation doesn’t impact Tenable Vulnerability Management customers because our vulnerability scoring is based on multiple sources.


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.