Tenable-Blog
Öffentlich zugängliche Secrets: Sicherheitslücken bei Cloud-Daten, die Ihr Unternehmen gefährden

AWS Access Analyzer Just Got Better, So Did Tenable Cloud Security
AWS IAM Access Analyzer now has an API allowing you to make custom policy checks. Tenable Cloud Security allows you to easily use this API as part of its code scanning functionality. Find out how and why it’s important.AWS today announced a significant enhancement to AWS IAM Access Analyzer (AA) all...
Identitäten: Das Bindegewebe für Sicherheit in der Cloud
Fast alles in der Cloud ist nur eine übermäßige Berechtigung oder Fehlkonfiguration davon entfernt, für Cyberrisiken anfällig zu sein. Proper cloud posture and entitlement management can help mitigate risk and eliminate toxic combinations....
Tenable Cyber Watch: NCSC Offers Guidance for Quantum Threat, SBOM Adoption for Securing the Software Supply Chain, and more
This week’s edition of Tenable Cyber Watch unpacks what organizations need to do to prepare for quantum computing attacks and addresses SBOM adoption to help organizations beef up the security of the software supply chain. Also covered: Der Office of Management and Budget drafts guidance for fe...
Cybersecurity Snapshot: Osten Gov’t Revises, Seeks Input on Security Assessment Questionnaire for Software Vendors
Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. Plus, it’s warning cyber teams about the threats from the Rhysida and Scattered Spider cybercrime groups. In addition, the...
Decrypting CNAPP: Moving Beyond the Acronyms and Analyst Jargon to a Unified Approach to Cloud Security
CNAPPs provide end-to-end protection of cloud workloads by combining previously siloed tools, such as CSPM and CWPP into a single platform. In this post, we’ll explain what the key benefits of CNAPP are and how organizations can use these tools to protect their cloud workloads....
Frequently Asked Questions for CitrixBleed (CVE-2023-4966)
Frequently asked questions relating to a critical vulnerability in Citrix NetScaler that has been under active exploitation for over a month, including by ransomware groups....
Tenable Cyber Watch: November Declared Critical Infrastructure Security and Resilience Month, and more
This week’s edition of Tenable Cyber Watch unpacks Critical Infrastructure Security and Resilience month and addresses the “Shields Ready” campaign aimed at promoting critical infrastructure security and resilience. Also covered: Do most organizations need a generative AI policy? What one poll shows...
Cybersecurity Snapshot: Are SBOMs on Your Supply Chain Security Radar Screen? Check Out New Recommendations from CISA and NSA
The SBOM concept is still half-baked, but CISA and NSA want to help change that with new best practices for software vendors, developers and buyers. Plus, there’s new guidance about the Royal ransomware gang – as ransomware attacks grow. In addition, Google highlights a new typosquatting trend impac...
Tenable Nessus Scanner Capabilities Receive Red Hat Recognition
Die Red Hat Vulnerability Scanner-Zertifizierung für Tenable Nessus unterstreicht unser Engagement, unseren Kunden auch weiterhin Einblick in ihre Red Hat Enterprise Linux-Systeme zu ermöglichen.Read about what this means and how it benefits our customers....