Here’s how to leverage Tenable solutions to achieve compliance with BOD 23-01 from the Cybersecurity and Infrastructure Security Agency (CISA).
Topics that are top of mind for the week ending Oct. 14 | DevOps team culture is key for supply chain security | SecOps gets more challenging as attack surface expands | Weak credentials hurt cloud security | Incident responders grapple with stress | Security spending grows | And much more!
CISOs want to shrink their cybersecurity tool stack and see improved interoperability among products so that they can draw actionable insights from uniform and normalized data. Here we explain why this is key for understanding your environment’s security posture and empowering you to make better decisions about mitigating risk.
Microsoft addresses 84 CVEs in its October 2022 Patch Tuesday release, including 13 critical flaws.
You’ve got questions and they’ve got answers. A global survey provides a snapshot of what it’s like to sit in the CISO chair, as these cybersecurity leaders face increasingly sophisticated cyber threa...
For large deployments of Tenable, where Tenable.io is shared across geographical or business boundaries, you can leverage role-based access control (RBAC) to logically segment scan data or, where required, restrict access to its scan data. In this blog, we’ll explain the configuration required to implement RBAC successfully.
CISA, the NSA and FBI issue a joint advisory detailing the top 20 vulnerabilities exploited by state-sponsored threat actors linked to the People’s Republic of China.
Fortinet has patched a critical authentication bypass in its FortiOS and FortiProxy products that could lead to administrator access.
Topics that are top of mind for the week ending Oct. 7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Not great | New malware cracks monthly top 10 list | And much more!
Antizipieren Sie mögliche Angriffe. Reduzieren Sie proaktiv Ihr Cyberrisiko. Kommunizieren Sie mit wichtigen Stakeholdern.
Cybersecurity-Teams haben mit reaktiven und isolierten Sicherheitsprogrammen und mit einer Vielzahl von Einzeltools zu kämpfen, die zwar haufenweise fragmentierte Daten generieren, aber nur wenige Erkenntnisse liefern. Im Folgenden gehen wir darauf ein, warum diese Teams eine Exposure Management-Plattform benötigen, die umfassende Sichtbarkeit bietet und es ihnen ermöglicht, Bedrohungen vorherzusehen, Behebungsmaßnahmen zu priorisieren und Risiken zu reduzieren.
Microsoft has confirmed reports of two zero-day vulnerabilities in Microsoft Exchange Server that have been exploited in the wild. Patches are not yet available.