Tenable Cyber Watch: Help for MITRE ATT&CK Mapping, Why Organizations Struggle with SaaS Data Protection, and more
This week’s edition of the Tenable Cyber Watch unpacks CISA’s new ‘Decider” tool, which aims to streamline MITRE ATT&CK mapping. We also explore why organizations struggle with data protection of software as a service apps. Also covered: Why cyber pros think cloud creates opportunities for cyber tea...
Cybersecurity Snapshot: CISA Issues Incident Response Tool for Microsoft Cloud Services
Learn about a free tool for detecting malicious activity in Microsoft cloud environments. Plus, Europol warns about ChatGPT cyber risks. Also, how business email compromise (BEC) scammers are stealing merchandise. In addition, CISA alerts orgs about early-stage ransomware breaches. And much more! ...
3CX Desktop App for Windows and macOS Reportedly Compromised in Supply Chain Attack
A softphone desktop application from 3CX, makers of a popular VoIP PBX solution used by over 600,000 organizations, has reportedly been trojanized as part of a supply chain attack...
Fünf Grundprinzipien für Hybrid Cloud-Sicherheit
How to build a hybrid-cloud security strategy that is effective, scalable and affordable. ...
Exposure Management: 7 Vorzüge eines Plattform-Ansatzes
Im Hinblick auf präventive Cybersicherheit gibt es seit langem Debatten darüber, ob es effektiver ist, eine Reihe von Best-of-Breed-Einzellösungen zu betreiben oder einen stärker konsolidierten Plattform-Ansatz zu wählen. Here are seven reasons an exposure management platform can help reduce cyber risk....
EPA Issues Cybersecurity Regulations for Public Water Systems: Wie Tenable helfen kann
EPA released new regulations that require states to assess cybersecurity risks at drinking water systems and ensure these systems have sufficient cyber protections. Here’s what you need to know — and how Tenable can help....
Tenable Cyber Watch: U.K. Cyber Agency Raises Privacy Concerns About ChatGPT, CISA Program Tackles Ransomware in Critical Infrastructure, and more
This week’s edition of the Tenable Cyber Watch unpacks CISA’s new pilot program that detects vulnerabilities in critical infrastructure and addresses the FBI’s plea for more ransomware victims to report attacks. Also covered: Why the U.K. National Cyber Security Centre is warning ChatGPT users to tr...
Federating Kubernetes Workloads with Cloud Identities
Your K8s workloads legitimately need access to sensitive cloud resources – federated identities let you grant it easily and securely....
Cybersecurity Snapshot: Strengthen Identity and Access Management Security with New CISA/NSA Best Practices
Learn about a new guide packed with best practices recommendations to improve IAM systems security. Plus, cybersecurity ranks as top criteria for software buyers. Also, guess who’s also worried about ChatGPT? Oh, and do you know what a BISO is? And much more! ...
Navigating Cloud Security: Why Segregating Environments from Dev to Production is so Important
Segregation in cloud environments is important for security — this post explores why and offers best practice tips for acting on it....
Tenable Cyber Watch: A Look at the U.S. National Cybersecurity Strategy, A Powerful AI Tech Gears Up for Prime Time, and more
This week’s edition of the Tenable Cyber Watch unpacks the White House’s National Cybersecurity Strategy and explores how artificial intelligence will help cyber teams with complex attacks. Also covered: Why software vendors should prepare to submit letters of attestation to the GSA. ...
OpenAI’s ChatGPT and GPT-4 Used as Lure in Phishing Email, Twitter Scams to Promote Fake OpenAI Tokens
Hoping to cash in on the massive interest around OpenAI’s GPT-4 – ChatGPT’s new multimodal model – scammers have launched phishing campaigns via email and Twitter designed to steal cryptocurrency. Check out how they’re carrying out the scams and how you can avoid becoming a victim....