Media room
Tenable news, announcements and global media coverage
Bienvenue dans la salle des médias de Tenable. Consultez nos dernières annonces et bénéficiez de notre couverture médiatique, accédez à nos coordonnées dans le monde et téléchargez notre kit média ci-dessous.
Get the latest Tenable news
Des versions produit innovantes aux rapports d'étude du secteur, en passant par les partenariats stratégiques, bénéficiez des actualités et des annonces officielles les plus récentes, directement dans votre boîte aux lettres.
Communiqués de presse
Tenable prévoit d'acquérir Vulcan Cyber et d'accélérer son leadership en gestion de l'exposition
Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
Tenable Security Center fournit une priorisation des vulnérabilités ciblée pour éliminer les expositions critiques qui augmentent le risque business
Tenable ajoute la gestion des correctifs (Patch Management) pour éliminer encore plus rapidement les expositions de sécurité
Tenable Selected by Tohoku University to Secure External-Facing Assets Amidst Migration to the Cloud
Dependency Confusion Could Have Led to RCE in Google Cloud Platform
Tenable has shared details on a dependency confusion attack method that could have exposed Google Cloud Platform (GCP) customers to remote code execution (RCE) attacks.
- Cybersecurity
IoT Unplugged – S3:E7 – Establishing priorities for Cloud security
In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Apple sends out iPhone spyware warnings in 92 countries: What you need to know
Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Two zero-days fixed in Microsoft's Patch Tuesday update
Speaking about this month's Patch Tuesday, senior staff research engineer Satnam Narang told Computing that the update is a reminder that flaws in Secure Boot persist and we could see more malicious activity related to Secure Boot in the future.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable
In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region
- Business
- Cybersecurity
- Vulnerability Management
Vallourec better secures Microsoft's Active Directory with Tenable
Solutions Numeriques •- Business
- Corporate News
- Cybersecurity
"Tenable One is the first brick of a greater whole"
Journal Du Net •- Business
- Corporate News
- Cybersecurity
EDF: can cyberattacks worsen the energy crisis this winter?
La Tribune •- Business
- Corporate News
- Cybersecurity
- Energy
Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援
ZDNet Japan •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
Nathan Wenzler discusses the impact of the great reshuffling on cybersecurity
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Australians urged to brace for ‘cyber pandemic’
The Australian •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Scott McKinnel discusses industry study findings with TickerTV Australia
TickerTV Australia •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
India’s push towards automation, digitisation to drive 5G, but holistic understanding of cybersecurity is must: Tenable
The Economic Times of India •- Business
- Corporate News
- Cybersecurity
Work of employees matters. Where they do it doesn’t: Bridgett Paradise, Tenable
The Economic Times of India •- Business
- Corporate News
- Cybersecurity
LockBit 2.0 Warning - What does it mean for businesses?
TickerTV Australia •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Achat d’Alsid par Tenable : une opération motivée par la nature critique d’Active Directory
LeMagIT •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
‘Crash Override’ malware heightens fears for US electric grid
The Hill •- Cyber Policy
- Cybersecurity
- Government
Sessions never got an election hacking briefing
POLITICO •- Corporate News
- Cyber Policy
- Government
Cyber Push Requires Funding, Tenable’s Makrokanis Urges
MeriTalk •- Cyber Policy
- Government
EU GDPR Final Countdown: How to Prepare Your Security Program
Infosecurity Magazine •- Cyber Policy
- Government
Hopes rise Trump will modernize feds' technology
The Hill •- Cyber Policy
- Government
Trump's cybersecurity order: Out with 'antiquated systems'
CNET •- Cyber Policy
- Government
Scammers Litter Dating Apps With AI-Generated Profile Pics
Bloomberg •Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."
- Business
- Cybersecurity
Microsoft says US rivals are beginning to use generative AI in offensive cyber operations
Associated Press •Microsoft and OpenAI said that U.S. adversaries — chiefly Iran and North Korea, and to a lesser extent Russia and China — are beginning to use their generative AI models to mount or organize offensive cyber operations. Amit Yoran, CEO of Tenable, tells AP, “Of course bad actors are using large-language models — that decision was made when Pandora’s Box was opened."
- Cybersecurity
US says it disrupted a China cyber threat, but warns hackers could still wreak havoc for Americans
Associated Press •FBI Director Chris Wray warned that China is positioning itself to disrupt the daily lives of Americans if the United States and China ever go to war. Amit Yoran, CEO of Tenable, called Wray’s warning “an urgent call to action. Continuing to turn a blind eye to the risk sitting inside our critical infrastructure is the definition of negligence.”
- Cybersecurity
- Government
Exclusive Feature: Data Privacy
Tahawultech News •Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately
IT Pro •Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.
- Business
- Cybersecurity
- Vulnerability Management
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
Celebrities’ accounts hacked in unprecedented Twitter attack
Saudi Gazette •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Hackers Compromise Twitter Accounts Of Major Public Figures
Silicon •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Online learning platform TCExam marked down for weak web security
The Daily Swig •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Plex plugs phishing-to-pwnage peril
The Daily Swig •- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
“Too late”: Cyberspace Solarium Commission report paints dark picture of US ravaged by cyberattacks
Verdict •- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
PAY PER VIEW How TikTok tempts kids to spend hundreds of pounds on virtual coins to pay ‘online celebs’
The Sun •- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Does diversity in cybsecurity actually matter? Ciara Campbell at Tenable gives us her take
Network Computing •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
The rise of double extortion ransomware
IT Pro •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
A year after the Colonial Pipeline attack – have we learnt anything?
Times of India •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
One year on from the attack on Colonial Pipeline - have we learnt anything?
Ticker Insight •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
Cybersecurity, a growing threat for the automotive industry
Just Auto •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
OT security coalition aims to bolster industrial cybersecurity
The Daily Swig •- Business
- Cybersecurity
- Energy
- Vulnerability Management
Media contacts
Kit média
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.