CNAPP: What Is It and Why Is It Important for Security Leaders?
A Cloud-Native Application Protection Platform (CNAPP) offers four key benefits to reduce risk and improve visibility. Here’s what you need to know.
Tenable’s Acquisition Of Cymptom: An “Attack Path-Informed” Approach to Cybersecurity
Tenable’s recent acquisitions all had the same overarching goal: helping our customers gain better security insights across their cyberattack surface.
Log4Shell : A Tale of Two Detection Techniques
Endpoint detection and response (EDR) can only take you so far in identifying Log4j exploit attempts. Here’s why dynamic checks are needed to uncover vulnerable versions of Log4j.
What Is IaC and Why Does It Matter to the CISO?
Many vendors and security companies are buying or building Infrastructure as Code (IaC) security into their portfolios, and this trend is only expected to continue. Voici ce que vous devez savoir. Infrastructure as code (IaC) is a relatively new phenomenon that is revolutionizing the way…
Securing Critical Infrastructure: The Essential Role of Public-Private Partnerships
Government collaboration with industry can help drive strategic planning and tactical operations to address cyberthreats. LeCybersecurity and Infrastructure Security Agency (CISA) states, “Public-private partnerships are the foundation for effective critical infrastructure security and…
A Holiday Story, Internet Edition: The Impact Of Assessing And Addressing Log4j Installations Proactively
A look at our log4j data.
Un asset évalué sur dix est vulnérable à Log4Shell
Si rien n'est fait, cela aura un impact sur le monde informatique en 2022.
Assess Log4Shell Like an Attacker With Tenable’s Dynamic Detections
Defenders need to pull out all the stops when it comes to Log4Shell. Tenable provides dynamic remote Log4Shell vulnerability detections to incorporate the attacker’s perspective of your organization.
Log4Shell : 5 mesures que la communauté OT devrait prendre immédiatement
Operational technology (OT) environments are equally at risk from the Apache Log4j flaw. Here's what you can do today.
Faille Apache Log4j : un moment digne de Fukushima pour l'industrie de la cyber sécurité (en anglais)
Les organisations du monde entier vont devoir gérer les conséquences à retardement de cette vulnérabilité des années durant.
Faille Apache Log4j : les applications tierces sous le feu des projecteurs
Even in the most mature organizations, addressing the issue, also known as Log4Shell, requires a complex mix of software development practices, vulnerability management and web application scanning.
4 questions pour réduire le cyber-risque lié à vos applications web et assets publics.
Posez-vous les quatre questions suivantes pour aider à réduire le cyber-risque que présentent vos applications web et vos assets publics.