Remove Compliance Remove Malware Remove Security Remove Webinar
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.

article thumbnail

How to manage cloud exploitation at the edge

CIO

However, this shift requires a thorough understanding of the security implications and how a business can protect its data and applications. As with all technology introductions, it’s important to have clear security policies, tools, processes, and training. Watch on-demand here. How is the cloud being attacked and why?

Cloud 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ChatGPT and Your Organisation: How to Monitor Usage and Be More Aware of Security Risks

CIO

While there is endless talk about the benefits of using ChatGPT, there is not as much focus on the significant security risks surrounding it for organisations. JPMorgan Chase has limited employees’ usage of ChatGPT due to compliance concerns. What are the dangers associated with using ChatGPT? Phishing 2.0:

ChatGPT 242
article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Get the latest on Microsoft 365 security configurations; effective CISO board presentations; rating MSPs’ cybersecurity preparedness; and hospitals’ Daixin cyberthreat. Cybersecurity and Infrastructure Security Agency (CISA) released a set of recommended configuration baselines for the Microsoft 365 product suite. .

Cloud 52
article thumbnail

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable

Tenable Cloud Security simplifies Kubernetes security by providing any containerized environment with new features including easy custom policy enforcement, enhanced access control, Helm charts scanning and workload protection.

article thumbnail

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

Ivanti

In a previous blog post, I discussed the two main areas to audit before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Review your current supply chain security flaws. Improving efficiency by streamlining processes, enhancing performance, reducing errors, etc.

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon, Cyber Agencies Warn

Tenable

critical infrastructure IT and operational technology security teams, listen up. So said cybersecurity agencies from the U.S., Cybersecurity and Infrastructure Security Agency (CISA) said in a statement. Dive into six things that are top of mind for the week ending February 9.