Tenable Cyber Watch: Shift Left Challenges, Anti-Ransomware Efforts, Quantum Risks and CISO Anxiety
December 12, 2022Beat the Monday blues with cyber news you can use | Shift-left efforts falling short. The White House’s war on ransomware. Everything you’ve ever wanted to know about CISOs. The quantum computing risk...
Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security
December 9, 2022Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more!
Cloud Security: 5 Key Takeaways from the SANS DevSecOps Survey
December 8, 2022A recent SANS Institute report finds that DevSecOps teams are improving their tooling, processes and techniques, but their organizations’ increasingly hybrid and multi-cloud IT environments are getting harder to secure. Check out key highlights from the “SANS 2022 DevSecOps Survey.”
Are You Ready for the Next Log4Shell? Tenable’s CSO and CIO Offer Their Advice
December 6, 2022Tenable CIO Patricia Grant and CSO Robert Huber share insights and best practices to help IT and cybersecurity leaders and their teams weather the next cyber crisis of Log4j proportions.
Introducing the Tenable Cyber Watch, Your Weekly Cyber Newscast
December 5, 2022Cybersecurity professionals are inundated with too much information. Separating the signal from the noise is hard. The Tenable Cyber Watch is here to help. Today, Tenable launches Cyber Watch, a we...
Cybersecurity Snapshot: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory
December 2, 2022Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more!
Cybersecurity Snapshot: Insights on Hive Ransomware, Supply Chain Security, Risk Metrics, Cloud Security
November 25, 2022Get the latest on the Hive RaaS threat; the importance of metrics and risk analysis; cloud security’s top threats; supply chain security advice for software buyers; and more!
A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations
November 22, 2022With the right ingredients, you can nail your board presentation every time. Check out these recommendations from seasoned Fortune 1000 CISOS. Presenting to the board can seem like the most dauntin...
Cybersecurity Snapshot: Insights on Log4j, Memory Attacks, Cloud Security, Ransomware
November 18, 2022Get the latest on an APT’s Log4Shell exploit; tips to prevent memory attacks; cloud security trends; metaverse security; and more!
Translating OT Security Recommendations into U.S. Policy Outcomes
November 15, 2022A recent NSTAC report to the president outlined additional strategies to secure the convergence of information technology and operational technology.
Cybersecurity Snapshot: Insights on Supply Chain Security, Hiring, Budgets, K8s, Ransomware
November 11, 2022Get the latest on staffing challenges; nation-state assaults on critical infrastructure; supply chain security tips; ransomware weak links; Kubernetes security; and more!
Shift left: Still a Work in Progress
November 8, 2022Experts say “shift left” practices are falling short. Here’s what you need to know and what you can do about it. Researchers are calling on companies to do a better job of educating developers abou...