Gérer et remédier aux vulnérabilités dues aux mauvaises configurations du cloud grâce à Tenable.cs et HashiCorp Terraform Cloudmai 4, 2022
Les intrusions dans le cloud connaissent un véritable rebond en raison de mauvaises configurations qui pourraient être évitées. Voici comment atténuer les risques grâce à une nouvelle intégration entre Tenable.cs et Terraform Cloud.
Cloud Security Posture Management solutions have become a must for detecting and fixing misconfigurations in public clouds — from code to runtime.
The research firm’s latest report also provides market insights security professionals can use to improve their vulnerability management strategy.
Tenable launches the 2022 Capture the Flag event for the security community, running from June 9-13. Get ready to test your hacking skills, practice new ones and see how you measure up against othe...
Hot Patches for Log4Shell Introduced Multiple Vulnerabilities in Amazon Web Services Amazon Web Services has addressed vulnerabilities introduced by the hot patches released in response to the ...
Oracle addresses 221 CVEs in its second quarterly update of 2022 with 520 patches, including 27 critical updates.
An expanding attack surface demands a robust cybersecurity strategy. Here’s what you need to know.
Microsoft’s April 2022 Patch Tuesday Addresses 117 CVEs (CVE-2022-24521) Microsoft addresses 117 CVEs in its April 2022 Patch Tuesday release, including two zero-day vulnerabilities, one of whi...
VMware Patches Multiple Vulnerabilities in Workspace ONE, Identity and Lifecycle Manager and vRealize (VMSA-2022-0011)7, 2022 avril
VMware cautions organizations to patch or mitigate several serious vulnerabilities across multiple products.
In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can help.
A list of frequently asked questions related to Spring4Shell (CVE-2022-22965).
Researchers disclose a moderate severity vulnerability in VMware vCenter Server that can be used in an exploit chain with other vCenter Server flaws to take over servers.