Tenable Cyber Watch: Cybersecurity Among World Economic Forum’s Top 10 Global...
We've got a new, must-see episode of the Tenable Cyber Watch, the weekly video news digest that help you zero-in on the things that matter right now in cybersecurity. Happy Monday!Time to grab another...
View ArticleTenable.sc 6.0: A Major Update that Boosts Visibility and Productivity
Tenable.sc powers the risk-based vulnerability management programs (RBVM) of all types of organizations, anchoring the world’s most demanding cybersecurity environments. With the introduction of...
View ArticleHow Analyzing External Attack Surface Data Boosts Your Security Strategy
Slicing and dicing your external attack surface data can yield valuable insights to help you strengthen your overall security strategy. But you can’t effectively analyze this data manually or with a...
View ArticleCybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While...
Learn all about how most IoT product makers lack vulnerability disclosure policies. Plus, businesses again rank cyber risk as their top concern. Also, check out a new toolbox for cybersecurity...
View ArticleSandworm APT Deploys New SwiftSlicer Wiper Using Active Directory Group Policy
Sandworm APT Deploys New SwiftSlicer Wiper Using Active Directory Group PolicySandworm, the Russian-backed APT responsible for NotPetya in 2017, has recently attacked an Ukrainian organization using a...
View ArticleTenable Cyber Watch: How CISOs Feel About Their Jobs, Why Devs Struggle with...
This week's edition of the Tenable Cyber Watch reveals key findings about CISO job satisfaction, explore how artificial intelligence and machine learning can be used to reduce risk and unpacks the...
View ArticleProxyNotShell, OWASSRF, TabShell: Patch Your Microsoft Exchange Servers Now
ProxyNotShell OWASSRF, TabShell: Patch Your Microsoft Exchange Servers NowSeveral flaws in Microsoft Exchange Server disclosed over the last two years continue to be valuable exploits for attackers as...
View ArticleThe Time Is Now for the U.S. Government To Help Africa Boost Cybersecurity
African governments are rightly prioritizing cybersecurity and the U.S. government can assist them in building critical infrastructure that is cyber secure by design. (Photo credit: U.S. Department of...
View ArticleCybersecurity Snapshot: As ChatGPT Fire Rages, NIST Issues AI Security Guidance
Learn all about NIST’s new framework for artificial intelligence risk management. Plus, how organizations are balancing AI and data privacy. Also, check out our ad-hoc poll on cloud security. Then read...
View ArticleTenable Cyber Watch: IoT Vendors Lack Vulnerability Disclosures, Cyber Ranks...
This week's edition of the Tenable Cyber Watch unpacks the importance of vulnerability disclosures, explores the top reasons why cyberthreats remain a top concern among business leaders, addresses the...
View ArticleHow to Extract Data and Value from Tenable’s EASM Solution
It’s essential for external attack surface management products to offer users a variety of data-extraction methods so that they can use the data in different scenarios and use cases. Learn how...
View ArticleCybersecurity Snapshot: Check Out Our No-Holds-Barred Interview with ChatGPT
We pulled no punches in our question-and-answer session with ChatGPT: Find out what the world’s most famous AI chatbot had to say. Plus, CISA and the FBI offer help in dealing with a massive ransomware...
View ArticleCyber Watch: A Peek Inside NIST’s AI Risk Framework, Protecting Employees...
Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for...
View ArticleCyber Watch: A Peek Inside NIST’s AI Risk Framework, Protecting Employees...
Chat GPT got you worried? In this week's edition of the Tenable Cyber Watch we unpack NIST's new AI risk framework. Also covered: how to communicate better with business colleagues, and tips for...
View ArticleNavigating Federal Cybersecurity Recommendations for Public Water Utilities:...
Cyberthreats to water and critical infrastructure have prompted the EPA to recommend states use the increased funding provided in the Bipartisan Infrastructure Bill for the Drinking Water State...
View ArticleMicrosoft’s February 2023 Patch Tuesday Addresses 75 CVEs (CVE-2023-23376)
Microsoft’s February 2023 Patch Tuesday Addresses 75 CVEs (CVE-2023-23376)Microsoft addresses 75 CVEs including three zero-day vulnerabilities that were exploited in the...
View ArticleHow Industry Partnerships Support Taking a Proactive, Preventive Approach to...
Exposure management requires open collaboration across the security ecosystem to solve difficult customer problems. An August 2022 technical issue identified by Microsoft and behind-the-scenes...
View ArticleSouth Korean and American Agencies Release Joint Advisory on North Korean...
South Korean and American Agencies Release Joint Advisory on North Korean RansomwareSeveral South Korean and American agencies have released a joint cybersecurity advisory on North Korean...
View ArticleCybersecurity Snapshot: If Recession Hits, Infosec Teams Expected to Suffer...
Find out why a study says cybersecurity pros will weather staff reductions better than all other employees. Plus, AI abuse concerns heat up as users jailbreak ChatGPT. Also, learn all about the...
View ArticleWorld Economic Forum Names Cybercrime and Cyber Insecurity Among Top 10...
Business and cyber leaders polled by WEF worry that geopolitical unrest will trigger a “catastrophic cyberattack” in the next two years. Here’s what you need to know.A two-year global pandemic. The war...
View Article