Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

July 21, 2025

Forrester 在 2025 年第 3 季 Unified Vulnerability Management Solutions Wave™ 報告中將 Tenable 評為領導者

“Tenable continues to extend its established vulnerability management offerings into exposure management with its Tenable One platform,” according to the report.

June 16, 2025

Exposure Management Is the Future of Proactive Security

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Jorge Orchilles, Senior Director of Readiness and Proactive Security at Verizon, offers an up-close glimpse at the th...


June 13, 2025

網路安全概要: NIST 提供玲信任建置建議,以及 OpenAI 分享誤用 ChatGPT 的事件

Check out NIST best practices for adopting a zero trust architecture. Plus, learn how OpenAI disrupted various attempts to abuse ChatGPT. In addition, find out what Tenable webinar attendees said about their exposure management experiences. And get the latest on cyber crime trends, a new cybersecuri...


June 11, 2025

最新網路安全行政命令:須知

A new cybersecurity Executive Order aims to modernize federal cybersecurity with key provisions for post-quantum encryption, AI risk and secure software development....


June 10, 2025

Microsoft 的 2025 年 6 月份 Patch Tuesday 解決了 65 個 CVE (CVE-2025-33053)

Microsoft addresses 65 CVEs, including two zero-day vulnerabilities, with one being exploited in the wild....


June 9, 2025

如何在曝險管理方案中使用以風險為基礎的指標

Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security engineers Arnie Cabral and Jason Schavel share how you can use risk-based metrics. ...


June 6, 2025

網路安全概要: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Check out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compens...


June 4, 2025

5 分鐘內加強雲端安全:在 GCP 中改善 Kubernetes 安全性的 3 個快速方法

In this fifth installment of Tenable’s “Stronger Cloud Security in Five” blog series, we offer three best practices for quickly hardening your Kubernetes environment’s security in GCP: remove wide inbound access to cluster APIs; remove root permissions from containers; and remove privileged permissi...


June 3, 2025

濫用用戶端延伸模組 (CSE):進入您 AD 環境的後門

Crucial for applying Active Directory Group Policy Objects, client-side extensions (CSEs) are powerful but also present a significant, often overlooked, attack vector for persistent backdoors. Rather than cover well-documented common abuses of built-in CSEs, this article demonstrates how to create c...


June 2, 2025

關於 BadSuccessor 的常見問答集

Frequently asked questions about “BadSuccessor,” a zero-day privilege escalation vulnerability in Active Directory domains with at least one Windows Server 2025 domain controller....


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

一窺勒索軟體生態系統究竟

下載報告 >