Facebook Google Plus Twitter LinkedIn YouTube RSS 功能表 搜尋 資源 - 部落格資源 - 網路研討會資源 - 報告資源 - 活動icons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

訂閱

Colonial Pipeline Ransomware Attack: How to Reduce Risk in OT Environments

It's time for Operational Technology (OT) environments to pursue a more proactive approach to cybersecurity by making cyber maintenance as much of a routine practice as the mechanical maintenance of s...
 Michael Rothschild
May 8, 2021

Open Banking Is the Future: 5 Ways to Secure Your Network

The sharing of financial data across applications is changing how consumers save, manage and spend their money. Here's how financial institutions can secure the next generation of banking. Open bankin...

Team Tenable
May 6, 2021

中斷針對 Active Directory 及身分無所不在的攻擊

要避免權限提升、橫向移動及攻擊者長期持續存在,保障 Active Directory 與身分基礎架構的安全至關重要。As we look deeper into recent high-profile breache...

 Amit Yoran
April 27, 2021

中斷攻擊路徑:何以 Tenable 併購 Alsid 非常重要

This acquisition allows us to combine Tenable's ability to assess the state of the digital infrastructure with Alsid's ability to assess the state of Active Directory, helping security professionals a...

 Renaud Deraison
April 27, 2021

How to Migrate to Office 365 the Secure Way

Looking to extend your Active Directory to the cloud? This guide explores options for securely migrating your on-prem identities and access controls to Office 365.  Cloud computing offers lower costs,...

Team Tenable
April 27, 2021

The Top 10 Active Directory Security Questions CISOs Must Ask

Active Directory has become the primary target for advanced cyberattacks and ransomware groups. Here's what you should consider when evaluating security vendors. For more than 20 years, Active Directo...

Team Tenable
April 27, 2021

Insider Threats in Active Directory: How to Safeguard Privileged and Non-Privileged User Accounts

In this post, we define privileges related to Active Directory and highlight the key security risks of internal privileged and non-privileged user groups. What do we mean by “privileges”? For the purp...

 Derek Melber
April 27, 2021

Primary Group ID Attack in Active Directory: How to Defend Against Related Threats

The Primary Group ID in Active Directory, created to help manage access to sensitive resources, has become a critical vulnerability that attackers can exploit to escalate privileges without leaving a...

 Derek Melber
April 27, 2021

How to Stop the Kerberos Pre-Authentication Attack in Active Directory

Here’s a look at how to safeguard your Active Directory from the known roasting attack on Kerberos Pre-Authentication. As part of the Kerberos authentication process in Active Directory, there is an i...

 Derek Melber
April 27, 2021

保障 Active Directory 的安全:How to Prevent the SDProp and adminSDHolder Attack

Attackers can get into your Active Directory by leveraging the SDProp process and gaining privileges through the adminSDHolder object. Here's how to stop them. Attackers use every possible trick and p...

 Derek Melber
April 27, 2021

保障 Active Directory 的安全:3 Ways to Close the No-Password Loophole

Any Active Directory user can have their password requirements negated with a simple command. Here’s how to identify these gaps before an attacker does. With Active Directory being around for so long,...

 Derek Melber
April 27, 2021

Tenable Assure: Announcing the 2021 Global Partner Award Winners

Celebrating the elite defenders who are helping organizations around the world conquer their cyber risk.  Cybersecurity is always a team effort. Day in, day out, defenders rely on an ecosystem of team...

 Jeff Brooks
April 22, 2021

Oracle April 2021 Critical Patch Update Addresses 257 CVEs including ‘Zerologon’ (CVE-2020-1472)

Oracle addresses over 250 CVEs in its second quarterly update of 2021 with 390 patches, including 34 critical updates. Background On April 20, Oracle released its Critical Patch Update (CPU) for Apri...

 Scott Caveza
April 21, 2021

Government Agencies Warn of State-Sponsored Actors Exploiting Publicly Known Vulnerabilities

Get the Details >

您是否容易受到最新攻擊程式危害?

輸入您的電子郵件地址,以便收到最新 cyber exposure 警示。

免費試用 立即購買

選擇 Tenable.io

免費試用 30 天

享受現代、雲端型的弱點管理平台,能夠以無與倫比的準確性查看和追蹤所有資產。 立即註冊。

立即購買 Tenable.io

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

65 項資產

選取您的訂閱選項:

立即購買
免費試用 立即購買

免費試用 Nessus Professional

免費試用 7 天

Nessus® 是現今市場上功能最全面的弱點掃描工具。Nessus Professional 能協助自動化弱點掃描程序、節省您達到合規性的時間並讓您的 IT 團隊合作。

購買 Nessus Professional

Nessus® 是現今市場上功能最全面的弱點掃描工具。Nessus Professional 能協助自動化弱點掃描程序、節省您達到合規性的時間並讓您的 IT 團隊合作。

購買多年期授權,節省更多。新增 365 天全年無休 24 小時全天候可使用電話、社群及對談的進階支援。完整詳情請見此處。

免費試用 立即購買

試用 Tenable.io Web Application Scanning

免費試用 30 天

享受我們專為現代應用程式而設計,屬於 Tenable.io 平台一部分的最新 Web 應用程式掃描產品的所有功能。不需耗費大量人力或中斷重要 Web 應用程式,即可高度準確且安全地掃描您整個線上產品系列中是否含有任何弱點。 立即註冊。

購買 Tenable.io Web Application Scanning

享受現代、雲端型的弱點管理平台,使您能夠以無與倫比的準確性查看和追蹤所有資產。 立即訂閱一年。

5 個 FQDN

$3,578

立即購買

免費試用 聯絡業務人員

試用 Tenable.io Container Security

免費試用 30 天

享受整合至弱點管理平台中的唯一容器安全產品的完整功能。監控容器映像中是否有弱點、惡意軟體及政策違規的情形。與持續整合和持續部署 (CI/CD) 系統整合,以支援 DevOps 作法、加強安全性並支援企業政策合規性。

購買 Tenable.io Container Security

Tenable.io Container Security 整合了建置程序,能提供包含弱點、惡意軟體和政策違規等容器影像安全性的能見度,讓您無縫並安全地啟用 DevOps 流程。

取得示範

取得 Tenable.sc 產品示範

請填寫以下表格並附上您的聯絡資訊,我們的業務代表將盡快與您聯絡,以安排產品示範。您也可以附上簡短註解 (字元上限為 255 個)。請注意,標示星號 (*) 的欄位是必填欄位。

免費試用 聯絡業務人員

試用 Tenable Lumin

免費試用 30 天

透過 Tenable Lumin,能夠以視覺方式呈現 Cyber Exposure 並加以探索,長期追蹤風險降低狀況,以及對照同業進行指標分析。

購買 Tenable Lumin

聯絡業務代表,瞭解 Lumin 如何協助您獲得整個企業的深入洞見,並管理網路風險。

申請示範

申請 Tenable.ot 產品示範

取得您所需要的操作技術安全性。
降低您無法處理的風險。

申請示範

Tenable.ad

持續偵測與回應 Active Directory 攻擊。 無需代理程式、無需特殊權限。提供内部部署和雲端兩種選擇。