Cybersecurity Snapshot: 6 Things That Matter Right Now
August 19, 2022Topics that are top of mind for the week ending Aug. 19 | A ransomware defense blueprint for SMBs. Why phishing is getting worse and what to do about it. The government revises its cybersecurity guidance for pipeline operators. A roundup of important vulnerabilities, trends and incidents. And much more!
Facing the Shift-Left Security Conundrum. A True Story
August 17, 2022Shift left security is hot — until it's not. Dynamic business requirements and cloud complexity pose major least privilege challenges.
Ransomware Preparedness: Why Organizations Should Plan for Ransomware Attacks Like Disasters
August 16, 2022As ransomware has cemented itself as one of the biggest cybersecurity threats to companies around the globe, it has become increasingly important that organizations treat ransomware attacks like they would a natural disaster and establish a robust preparedness plan.
Cybersecurity Snapshot: 6 Things that Matter Right Now
August 12, 2022Topics that are top of mind for the week ending Aug. 12 (Black Hat Special Edition) | The Black Hat USA conference returned to Las Vegas this week to celebrate its 25th anniversary, as thousands of security pros gathered in the desert to get wiser about critical challenges, including cloud security, software supply chain risks, ransomware and the rampant burnout and stress among their ranks. Here’s what caught our attention at the event.
Accelerate Vulnerability Detection and Response for AWS with Tenable Cloud Security Agentless Assessment
August 10, 2022Learn how to leverage our latest cloud security discovery feature, Tenable Cloud Security Agentless Assessment, to enhance the way you can scan for software vulnerabilities and misconfigurations in the cloud.
Introducing Tenable Cloud Security with Agentless Assessment and Live Results
August 10, 2022Tenable’s latest cloud security enhancements unify cloud security posture and vulnerability management with new, 100% API-driven scanning and zero-day detection capabilities.
3 Ways to Reduce the Risk from Misused AWS IAM User Access Keys
August 10, 2022Used incorrectly, AWS IAM user access keys can pose high risk; the good news is that great alternatives, explored here, exist.
Microsoft’s August 2022 Patch Tuesday Addresses 118 CVEs (CVE-2022-34713)
August 9, 2022Microsoft addresses 118 CVEs in its August 2022 Patch Tuesday release, including 17 critical flaws.
Cybersecurity Snapshot: 6 Things That Matter Right Now
August 5, 2022Topics that are top of mind for the week ending Aug. 5 | Don’t take your eye off the Log4j ball. The dangers of unsupported software. Why low MFA adoption is everyone’s problem. Preventing ransomware attacks. And much more!
Analyzing the Vulnerabilities Associated with the Top Malware Strains of 2021
August 4, 2022International cybersecurity agencies issue a joint alert outlining the top malware strains of 2021. We identified vulnerabilities associated with these strains.
CVE-2022-31656: VMware Patches Several Vulnerabilities in Multiple Products (VMSA-2022-0021)
August 2, 2022VMware has patched another set of serious vulnerabilities across multiple products including VMware Workspace ONE Access. Organizations should patch urgently given past activity targeting vulnerabilities in VMware products.
Cybersecurity Snapshot: 6 Things That Matter Right Now
July 29, 2022Topics that are top of mind for the week ending July 29 | Boost your security awareness program. Why fire drills hurt security teams. A quick temperature check on attack surface management. Protecting smart factories from cyberattacks. And much more!