by Communications | Feb 9, 2022 | Tenable
Many vendors and security companies are buying or building Infrastructure as Code (IaC) security into their portfolios, and this trend is only expected to continue. Here’s what you need to know. Infrastructure as code (IaC) is a relatively new phenomenon that is...
by Communications | Jan 28, 2022 | Lenovo
For an energy facility that serves tens of millions, a high magnitude earthquake or strong flood can trigger a catastrophic power failure with rippling consequences. The estimated loss for just an hour of downtime can rack up losses of up to millions of dollars....
by Communications | Jan 20, 2022 | Tenable
Threats to the internet of things (IoT) continue to evolve as users and businesses grow increasingly reliant on these tools for constant connectivity, access to information and data, and workflow continuity. Cybercriminals have taken notice of this dependence and now...
by Communications | Dec 15, 2021 | Tenable
We are sure you are aware of the recent discovery of the very damaging Log4j Vulnerability with Apache. Below you will find free resources created by Tenable—our cyber security partner—that will help you detect the Log4j vulnerability. Tenable Plugins & Optimal...
by Communications | Dec 14, 2021 | Tenable
Critical vulnerability in the popular logging library, Log4j 2, impacts a number of services and applications, including Minecraft, Steam and Apple iCloud. Attackers have begun actively scanning for and attempting to exploit the flaw. Update December 11: The...