Aggregator
美国新成立的社交网络全面控制机构
Hunters
Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources
Learn how data security posture management (DSPM) and AI security posture management (AI-SPM) can help you address key cloud security challenges.
The cloud has become the lifeblood of modern businesses. Its flexibility, scalability and ever-expanding range of storage technologies have fueled a data explosion. From object storage for massive media archives to NoSQL databases for real-time analytics, organizations are embracing a diverse cloud data landscape.
Artificial intelligence (AI) is another key driver behind the ever-increasing volume and variety of data stored in the cloud. As AI applications become more sophisticated, they require more data to learn and function effectively.
Together, this creates a virtuous cycle — the more data stored and used the greater the range of AI use cases, which attract even more users. But with each new user, data type and storage solution, the cloud attack surface expands.
Traditional, perimeter-based security struggles in the dynamic world of cloud storage. Data in the cloud is constantly on the move, residing in various locations and formats. Further, with the rapid improvements in AI technology, many organizations are now using and/or creating new proprietary AI models based on their data to deliver novel insights and innovations.
How DSPM and AI-SPM can improve cloud securityThe cloud’s unique challenges and opportunities for data and AI make it crucial for organizations to address the full spectrum of security responsibilities that accompany collecting, storing and using data. These responsibilities include automatically and continuously scanning data assets, discovering and monitoring sensitive data and alerting on any potential risk. To address these challenges, new solutions such as data security posture management (DSPM) and AI security posture management (AI-SPM) are becoming integral to many organizations.
Most cloud security solutions offer numerous valuable tools, but lack the proper data analysis needed to help practitioners prioritize the organization’s most sensitive assets. Though such cloud security solutions may excel at securing the cloud environment itself, they fail to address the data and AI resources residing within. Conversely, though standalone DSPM and AI-SPM services act as powerful spotlights to illuminate data and AI resources, if they’re not combined with broader cloud security measures, they can't prevent unauthorized access or breaches that exploit vulnerabilities in the cloud infrastructure.
In order to gain robust protection for your organization, you need DSPM and AI-SPM to pinpoint your valuable data and AI resources and cloud security solutions to build a secure vault around them.
Tenable Cloud Security now offers DSPM and AI-SPM capabilitiesTo help organizations address their data and AI security needs, Tenable Cloud Security now has fully integrated DSPM and AI-SPM capabilities.
Source: Tenable, October 2024
Tenable Cloud Security’s integrated DSPM and AI-SPM features offer significant advantages over standalone products. Users are empowered with deep data discovery and classification, ensuring sensitive information is identified and prioritized for protection. This intrinsic visibility allows for focused security measures and simplifies compliance efforts. We’ve also further enhanced Tenable’s best-in-class cloud infrastructure entitlement management (CIEM) capabilities to enforce AI entitlement management, enabling organizations to ensure only users with the correct access policies can access proprietary AI models.
The DSPM and AI-SPM features integrated into Tenable Cloud Security, a cloud native application protection platform (CNAPP), make it a force multiplier for securing your organization.
The future of cloud security lies in a unified approach that addresses the full spectrum of threats. CNAPPs are evolving to become the central nervous system of cloud security, offering a single pane of glass for managing vulnerabilities, workload protection and access control. The integration of DSPM and AI-SPM capabilities into Tenable Cloud Security represents a significant step toward this vision. As CNAPP platforms evolve, we can expect a future where cloud security becomes as seamless and scalable as the cloud itself.
Learn more about DSPM and AI-SPM好产品就是与时代和生活共振|2024 年度极客最爱好物启动
记录生生不息的创新力量|2024 年度「InnoForce 50」启动
Ransomware and Cyber Extortion in Q3 2024
Ransomware and Cyber Extortion in Q3 2024
0xGame week1 re&pwn&web
Windows 内核态驱动本地权限提升漏洞(CVE-2024-35250)
Congress Seeks Urgent Action After Chinese Telecom Hack
Congress is demanding answers from AT&T, Verizon, and Lumen after reports revealed that Chinese hackers breached U.S. telecom infrastructure, targeting systems linked to court-authorized wiretaps, as the FBI and the Cybersecurity and Infrastructure Security Agency investigate the Salt Typhoon group.
Revenue Cycle Vendor Notifying 400,000 Patients of Hack
A Texas-based revenue cycle management firm is notifying about 400,000 individuals of a hacking incident it says originated with another third party. The incident is among a growing list of major breaches implicating vendors and cumulatively affecting tens of millions of patients so far this year.
Oil and Gas Firms Aware of Cyber Risks
The oil and gas industry has high levels of cyber awareness and low levels of cyber insurance, says a sectoral assessment from credit rating agency Moody's. The sector has experienced a clutch of high-profile attacks including a high-profile 2021 incident at Colonial Pipeline.
Most EU Nations to Miss Upcoming NIS2 Deadline
Most European countries are set to miss a trading bloc deadline for implementing a key cybersecurity regulation that requires measures such as mandatory security auditing for essential services such as hospitals and banks. Just six countries have integrated the NIS2 directive into national law.
Biden-Harris Administration Announces Preliminary Terms with Wolfspeed to Solidify U.S. Technological Leadership in Silicon Carbide Manufacturing
Guidance: Framing Software Component Transparency: Establishing a Common Software Bill of Materials (SBOM)
Today, CISA published the Framing Software Component Transparency, created by the Software Bill of Materials (SBOM) Tooling & Implementation Working Group, one of the five SBOM community-driven workstreams facilitated by CISA. CISA’s community-driven working groups publish documents and reports to advance and refine SBOM and ultimately promote adoption. This resource serves as the detailed foundation of SBOM, defining SBOM concepts and related terms and offering an updated baseline of how software components are to be represented. This document serves as a guide on the processes around SBOM creation.
For more information on all things SBOM, please visit CISA’s Software Bill of Materials website.
CISA Releases Two Industrial Control Systems Advisories
CISA released two Industrial Control Systems (ICS) advisories on October 15, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-289-01 Siemens Siveillance Video Camera
- ICSA-24-289-02 Schneider Electric Data Center Expert
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-30088 Microsoft Windows Kernel TOCTOU Race Condition Vulnerability
- CVE-2024-9680 Mozilla Firefox Use-After-Free Vulnerability
- CVE-2024-28987 SolarWinds Web Help Desk Hardcoded Credential Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.