Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable blog

August 1, 2025

網路安全概要: AI Security Trails AI Usage, Putting Data at Risk, IBM Warns, as OWASP Tackles Agentic AI App Security

Check out fresh insights on AI data security from IBM’s “Cost of a Data Breach Report 2025.” Plus, OWASP issues guide on securing Agentic AI apps. In addition, find out how to protect your org against the Scattered Spider cyber crime group. And get the latest on zero-trust microsegmentation; containing and evicting network intruders; and Tenable’s Black Hat plans!

March 11, 2024

如何利用曝險管理平台保護您的 IT、OT 和 IoT 資產:情境式優先排序的重要性

Discover how contextual prioritization of exposure is revolutionizing OT/IoT security, enabling organizations to shift from reactive to proactive breach prevention....


March 8, 2024

網路安全概要: Cyber Pros Say How AI Is Changing Their Work, While the FBI Reports Ransomware Hit Critical Infrastructure Hard in 2023

More than 40% of ransomware attacks last year impacted critical infrastructure. Plus, a survey shows how artificial intelligence is impacting cybersecurity jobs. Meanwhile, MITRE updated a database about insider threats. And why you need a custom compensation strategy to recruit cyber pros. And much...


March 6, 2024

CVE-2024-27198、CVE-2024-27199: 在 JetBrains TeamCity 中的 2 個迴避身分驗證的弱點

Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution....


March 1, 2024

網路安全概要: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. And much more!...


February 29, 2024

如何利用一套曝險管理平台保護您所有的資產,包括:IT、OT 和 IoT

企業的安全團隊面臨捍衛其重大 OT/IoT 基礎設施的嚴峻阻礙,包括:支離破碎的能見度、意料之外的風險以及資料孤島等。Discover how purpose-built solutions for OT/IoT exposure management can help organizations enhance visibility, prioritize cybersec...


February 23, 2024

網路安全概要: 正當 CISO 強調自來水廠的安全性時,LockBit 集團遭到破獲

Check out how cyber agencies from multiple countries hit the LockBit ransomware group. Meanwhile, CISA wants water treatment plants to button up their cyber defenses. Plus, there’s a new generative AI governance checklist for tech and business leaders. And the White House seeks to boost ports' cyber...


February 22, 2024

IDC 連續第 5 年在全球裝置弱點管理市場佔有率將 Tenable 評等為第一

The research firm’s latest report also provides market insights that security professionals can use to improve their vulnerability management strategy....


February 21, 2024

利用先進的 OT 安全保護美國國防部建築物管理系統

The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are designed to improve the monitoring and maintenance of these systems, but they also create new atta...


February 20, 2024

有關 ScreenConnect 弱點的常見問答集

Frequently asked questions about two vulnerabilities affecting ConnectWise ScreenConnect...


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

一窺勒索軟體生態系統究竟

下載報告 >