Test Your Hacking Skills: Join Tenable’s Annual CTF Competition!
Tenable launches the 2022 Capture the Flag event for the security community, running from June 9-13. Get ready to test your hacking skills, practice new ones and see how you measure up against others in the industry by joining this year’s Capture the Flag event. Each year, Tenable hosts its ...
You’ve Migrated Business-Critical Functions to the Cloud…Now What?
An expanding attack surface demands a robust cybersecurity strategy. Here’s what you need to know....
Securing Critical Infrastructure: It's Complicated
In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can help....
CNAPP: What Is It and Why Is It Important for Security Leaders?
A Cloud-Native Application Protection Platform (CNAPP) offers four key benefits to reduce risk and improve visibility. Here’s what you need to know....
Tenable’s Acquisition Of Cymptom: An “Attack Path-Informed” Approach to Cybersecurity
Tenable’s recent acquisitions all had the same overarching goal: helping our customers gain better security insights across their cyberattack surface....
Log4Shell:A Tale of Two Detection Techniques
Endpoint detection and response (EDR) can only take you so far in identifying Log4j exploit attempts. Here’s why dynamic checks are needed to uncover vulnerable versions of Log4j....
What Is IaC and Why Does It Matter to the CISO?
Many vendors and security companies are buying or building Infrastructure as Code (IaC) security into their portfolios, and this trend is only expected to continue. 以下是幾點須知。Infrastructure as code (IaC) is a relatively new phenomenon that is revolutionizing the way organizati...
Securing Critical Infrastructure: The Essential Role of Public-Private Partnerships
Government collaboration with industry can help drive strategic planning and tactical operations to address cyberthreats. 美國Cybersecurity and Infrastructure Security Agency (CISA) states, “Public-private partnerships are the foundation for effective critical infrastructure security and res...
A Holiday Story, Internet Edition: The Impact Of Assessing And Addressing Log4j Installations Proactively
A look at our log4j data....
1/10 受評估的資產都容易遭到 Log4Shell 攻擊
If not addressed now, it will define computing in 2022....
Assess Log4Shell Like an Attacker With Tenable’s Dynamic Detections
Defenders need to pull out all the stops when it comes to Log4Shell. Tenable provides dynamic remote Log4Shell vulnerability detections to incorporate the attacker’s perspective of your organization....
Log4Shell:OT 社群應立即採取的 5 個步驟
操作技術 (OT) 環境同樣也面臨 Apache Log4j 缺陷帶來的風險。Here's what you can do today....