Remove Security Remove Survey Remove Technical Review Remove White Paper
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.

article thumbnail

Cybersecurity Snapshot: Cyber Engineers and Architects Saw Salaries Spike in 2022

Tenable

Find out how much of a pay bump cybersecurity architects and engineers got. Plus, a powerful AI cybersecurity tech is nearing prime time. Also check out the long-awaited security algorithms for IoT devices. That’s according to Dice.com’s annual “Tech Salary Report,” released this week. And much more!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why Cybersecurity Leaders Struggle to Answer the Question ‘How Secure Are We?’

Tenable

Independent business risk study shows cybersecurity is seldom fully integrated into business strategy – and it needs to be. The first question she asks you is: “How secure are we?” . If you’ve spent more than a minute in cybersecurity, you know why answering this question is far more challenging than it might seem. .

article thumbnail

Cybersecurity Snapshot: As OpenAI Honcho Hits Capitol Hill, Regulatory Storm Clouds Form Over AI La La Land

Tenable

Altman goes to Washington Lively discussions around how much government control there should be over artificial intelligence (AI) products continue globally – and cybersecurity teams should closely monitor which way the regulatory winds are blowing. Senate Judiciary Committee’s Subcommittee on Privacy, Technology and the Law.

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

It was at around this time last year that the discovery of the zero-day Log4Shell vulnerability in the ubiquitous Log4j open source component sent shockwaves through the worlds of IT and cybersecurity. . 2 - OWASP’s top 10 CI/CD security risks. How long will this Log4Shell problem linger? Back in July, the U.S.

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

That’s the bad news the Cybersecurity and Infrastructure Security Agency’s Cyber Safety Review Board delivered in a recent report. Drive best practices for security hygiene, such as automated vulnerability management, asset inventorying and vulnerability mitigation, as well as secure software development practices.

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon, Cyber Agencies Warn

Tenable

In addition, new group tasked with addressing the quantum computing threat draws big tech names. critical infrastructure IT and operational technology security teams, listen up. So said cybersecurity agencies from the U.S., Cybersecurity and Infrastructure Security Agency (CISA) said in a statement.