This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Tenable CSO Bob Huber called the DHS bulletin “a stark reminder of the volatile environment that organizations and their cyber leaders operate in ” in a blog post this week. They’re easy to use, hard to compromise, and eliminate password fatigue,” the blog reads. Passkeys are rolling out fast.
For more information about Tenables cybersecurity best practices, check out these Tenable blogs: " Establishing a Cloud Security Program: Best Practices and Lessons Learned " " How To Clean Up Your Cloud Environment Using Tenable Cloud Security " " Walking the Walk: How Tenable Embraces Its "Secure by Design" Pledge to CISA " " Strengthening the Nessus (..)
The scope of the BOD 25-01 includes all production or operational cloud tenants (operating in or as a federal information system) utilizing Microsoft 365, Tenable Staff Research Engineer Mark Beblow explained in a recent blog about this directive. Tenable was one of the 68 original signatories of the pledge.
The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog. In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.
In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. This convergence requires CISOs to go beyond traditional security practices and prove their business value.
An initial probe of the incident has revealed no evidence that customer data or encrypted password vaults were accessed by the intruder, CEO Karim Toubba stated in a company blog post. To read this article in full, please click here
While the vast majority of our customers made the overnight switch—many still need to adopt a cloud-native architecture. In a recent blog, McAfee’s Steve Grobman indicated SolarWinds is the first major supply chain attack which represents a shift in tactics where a nation state has employed a new weapon for cyber-espionage.”
For more information about data and AI security posture management ( DSPM and AI-SPM ), check out these Tenable resources: Data and AI Security Posture Management (video) Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources (blog) Know Your Exposure: Is Your Cloud Data Secure in the Age of AI? (on-demand
A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. He has created partnerships among fellow government peers—from cities to counties to federal to schools—with the private sector, and with vendors.
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Its cloud-native, open architecture was exactly the right fit for Legendary Entertainment’s environment.
The directive’s third section, entitled “Modernizing Federal Government Cybersecurity,” requires Federal Civilian Executive Branch (FCEB) agencies to begin moving to a zero trust architecture (ZTA). For instance, it commands each agency head to “develop a plan to implement Zero Trust Architecture” with 60 days of the Order’s release.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content