Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 部落格

August 7, 2025

CVE-2025-53786: Frequently Asked Questions About Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability

Frequently asked questions about CVE-2025-53786, an elevation of privilege vulnerability affecting Microsoft Exchange Server Hybrid Deployments.

December 6, 2023

CVE-2023-4966 (CitrixBleed): Invalidate Active or Persistent Sessions To Prevent Further Compromise

Patching CitrixBleed isn’t enough; organizations need to invalidate active or persistent session tokens as the these tokens can be used to compromise networks and bypass authentication measures including multifactor authentication...


December 4, 2023

Tenable 網路觀察:CSA 發表零信任認證、CISA 更新了安全證明表單等等

This week’s edition of Tenable Cyber Watch unpacks CISA’s Security Attestation Form Draft and discusses CSA’s new Zero Trust Certification. Also covered: The FCC’s new pilot program that would help U.S. schools and libraries boost their cybersecurity. ...


December 1, 2023

網路安全概要: 美國、英國政府對建立安全的 AI 系統提出建言

Looking for guidance on developing AI systems that are safe and compliant? Check out new best practices from the U.S. and U.K. cyber agencies. Plus, a new survey shows generative AI adoption is booming, but security and privacy concerns remain. In addition, CISA is warning municipal water plants abo...


November 30, 2023

利用身分驗證掃描發揮您弱點掃描的最高價值

Want to get a lot more value out of your vulnerability scans? Start doing authenticated scanning...


November 27, 2023

AWS Access Analyzer 愈來愈強大,Tenable Cloud Security 也是

AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA) all...


November 27, 2023

身分:雲端中安全性的結締組織

幾乎所有雲端中的資源,都可能因為一個過度權限或錯誤設定而曝險。 Proper cloud posture and entitlement management can help mitigate risk and eliminate toxic combinations....


November 27, 2023

Tenable 網路觀察:NCSC 針對量子威脅提出指引、為保護軟體供應鏈所採用的 SBOM 以及更多內容

This week’s edition of Tenable Cyber Watch unpacks what organizations need to do to prepare for quantum computing attacks and addresses SBOM adoption to help organizations beef up the security of the software supply chain. Also covered: 美國Office of Management and Budget drafts guidance for fe...


November 24, 2023

網路安全概要: U.S. 政府修法,對軟體廠商進行問卷調查尋求有關安全評估的意見

Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. Plus, it’s warning cyber teams about the threats from the Rhysida and Scattered Spider cybercrime groups. In addition, the...


November 21, 2023

Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security

CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads....


您可以利用的網路安全最新消息

輸入您的電子郵件,就不會錯過來自 Tenable 專家提供的及時警示與安全指引。

一窺勒索軟體生態系統究竟

下載報告 >