Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

May 2, 2023

利用全州動員網路安全 (Whole-of-State Cybersecurity) 方法保護當地政府機構

Facing frequent and aggressive cyberattacks, local governments often struggle to defend themselves due to a lack of tools and resources. But it doesn’t have to be this way. With a whole-of-state approach, local governments can pool resources and boost their defenses, reducing cyber risk via improved...


May 1, 2023

Tenable 網路觀察:3 Hot Takes from RSA Conference, Samsung Employees Leak Sensitive Data to ChatGPT, and more

This week’s edition of the Tenable Cyber Watch dishes out 3 hot takes from the RSA Conference and unpacks the Samsung employee data leak to ChatGPT. Also covered: What cyber professionals say is their biggest worry. ...


April 28, 2023

網路安全概要: 具有吃到飽 AI 和 ChatGPT 功能的 RSA 大會特別版

Check out our roundup of what we found most interesting at RSA Conference 2023, where – to no one’s surprise – artificial intelligence captured the spotlight, as the cybersecurity industry grapples with a mixture of ChatGPT-induced fascination and worry. Oh generative AI, it hurts so good!...


April 26, 2023

IDC 連續 4 年在裝置弱點管理市場佔有率將 Tenable 評為第一名

The research firm's latest report also provides market insights security professionals can use to improve their vulnerability management strategy....


2023 年 4 月 25 日

如何改善 Kubernetes 安全:4 個現在就能建置的最佳做法

How to ensure the right configurations and policies are in place to keep your cloud environments secure....


2023 年 4 月 25 日

What Security Leaders Need to Know About Security End of Life: How Tenable is Leading the Way

Handling end-of-life conditions for software and hardware products is complicated by different stages and definitions. Tenable is leading the way on defining these disparate vulnerabilities under a comprehensive Security End of Life framework that addresses the common risk exposure to our customers....


April 24, 2023

「K」代表「Komplex」:資安團隊的 Kubernetes 關鍵考量

The use of Kubernetes introduces complexity to the modern attack surface and requires a different approach to security than traditional IT infrastructure. Security teams need a base understanding of Kubernetes architecture, configurations and deployment processes to effectively manage risk. Here’s w...


April 24, 2023

Cloud Workload Protection (CWP) Best Practice – Focus on Impact, Not Volume

How to do CWP right to prepare your organization and protect it from the next widespread vulnerability. ...


April 24, 2023

Tenable 網路觀察:Dark Web Marketplace Genesis Market Shut Down, How Using ChatGPT Can Breach Data Privacy Rules, and more

This week’s edition of the Tenable Cyber Watch unpacks the international sting operation that successfully shut down notorious cybercrime marketplace Genesis Market and explores how using ChatGPT can breach data privacy rules. Also covered: Why the cybersecurity term “BISO” is getting all the buzz. ...


April 24, 2023

建立風氣:讓 OT 安全社群團結一致分享威脅資訊

Tenable participates in a first-of-its-kind initiative that will aggregate information from several operational technology (OT) security vendors to share emerging threat intelligence with critical infrastructure service providers....


April 21, 2023

CVE-2023-20864:VMware Aria 作業的記錄檔還原序列化弱點

VMware issues advisory to address two flaws in its VMware Aria Operations for Logs solution, including a critical deserialization flaw assigned a CVSSv3 score of 9.8....


April 21, 2023

網路安全概要: 供應鏈安全最新消息– SBOM 發布、開放原始碼缺陷及最新的安全架構

Check out what CISA says about the sharing of software bills of materials. Plus, why you should tread carefully with open source components. Also, the SLSA supply chain security framework is ready. In addition, security worries hold back enterprise IoT adoption. And much more!...


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

Apache Log4j 缺陷讓第三方軟體成為目光焦點

取得詳細資訊 >