Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

مدونة Tenable

March 24, 2026

تعرّف على Tenable Hexa AI: الذكاء الاصطناعي الوكيل لإدارة التعرض للمخاطر

تعرّف على Tenable Hexa AI: المحرك الوكيل لمنصة Tenable One Exposure Management Platform. تعرّف على كيفية قيام Tenable Hexa AI بأتمتة عمليات سير العمل الأمنية المعقدة، وتحويل التحليل الذكي لحالات التعرض للمخاطر إلى إجراءات منسقة لمساعدة فرق الأمن لديك على تقليل المخاطر الإلكترونية بشكل فعال.

August 8, 2023

إدارة كلمة المرور والمصادقة أفضل الممارسات

Attackers are always looking for new ways to crack passwords and gain access to sensitive information. Keeping passwords secure is a challenging, yet critical task. Read this blog to learn several best practices for password management and authentication so you can keep your environment safe.


August 7, 2023

مشاهدة Tenable Cyber: هيئة الأوراق المالية والبورصة تصدر قواعد جديدة للإفصاح الإلكتروني، وأخطر نقاط الضعف في برامج MITRE، والمزيد

This week’s edition of Tenable Cyber Watch unpacks the new cybersecurity disclosures rules from the U.S. Securities and Exchange Commission and looks at MITRE’s list of the most dangerous software weaknesses. Also covered: Cloud adoption by financial institutions continues to increase. What one…


August 4, 2023

Cybersecurity Snapshot: ماذا يقلقني؟تتبنى الشركات الذكاء الاصطناعي التوليدي، وتتخلص من المخاطر الأمنية

Seduced by generative AI’s potential, organizations plunge ahead overlooking its pitfalls. Plus, check out a common flaw that puts web app data at risk. Also, why many zero day bugs last year were variants of known vulnerabilities. Moreover, find out the current cost of a data breach – ouch! And…


August 3, 2023

Avoiding the Security Potluck: Good Governance Helps You from Code to Cloud

What's involved in shifting cloud security responsibilities to the app development team with governance by the security team?


August 3, 2023

AA23-215A: 2022's Top Routinely Exploited Vulnerabilities

A joint Cybersecurity Advisory collaborated on by multiple international agencies highlights the top routinely exploited vulnerabilities of 2022.


August 2, 2023

CNAPPgoat: The Multicloud Open-Source Tool for Deploying Vulnerable-by-Design Cloud Resources

Here’s all you need to know about CNAPPgoat, our open-source project designed to modularly provision vulnerable-by-design components in cloud environments.


August 2, 2023

Using the Service Location Protocol (SLP) to Find Exposed Management Interfaces

Exposed management interfaces are valuable entry points for attackers. CISA Binding Operational Directive 23-02 calls for getting them off the internet. Here’s a novel approach for finding some of these elusive devices using SLP.


August 2, 2023

Unpacking the Shared Responsibility Model for Cloud Security: How To Avoid Coverage Gaps and Confusion

Confusion over the scope of customer responsibility for cloud security causes control gaps and exposes businesses to risks of attack and non-compliance. Secure configuration of customer-managed resources is the most critical factor for reducing cloud risk. However, it can only be achieved by first…


أخبار الأمن الإلكتروني التي يمكنك استخدامها

أدخل بريدك الإلكتروني ولن تفوتك أي تنبيهات فورية وإرشادات الأمان من الخبراء في Tenable.