Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Rechercher Ressource - BlogRessource - WebinaireRessource - RapportRessource - Événementicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Bienvenue dans la salle des médias de Tenable. Consultez nos dernières annonces et bénéficiez de notre couverture médiatique, accédez à nos coordonnées dans le monde et téléchargez notre kit média ci-dessous.

Get the latest Tenable news

Des versions produit innovantes aux rapports d'étude du secteur, en passant par les partenariats stratégiques, bénéficiez des actualités et des annonces officielles les plus récentes, directement dans votre boîte aux lettres.

S'abonner

Communiqués de presse

No results are matching your search criteria.

SecOps Teams Need to Tackle AI Hallucinations to Improve Accuracy

Dark Reading

AI hallucinations are inevitable right now, especially with an influx of AI-powered tools hitting the market. However, there are ways security teams can mitigate or adjust to the risk. Implementing a similar structure to how code is reviewed is one method, Tenable CSO Bob Huber recommends.

 

Tenable Bolsters AI Controls With Apex Security Acquisition

Data Breach Today

Tenable announces its intent to purchase Apex Security, a pioneer in securing the rapidly expanding AI attack surface. Apex Security will bring deep visibility into user behavior and help address accidental and malicious misuse of AI. Tenable CPO Eric Doerr said clients demand tools that detect AI usage and also implement enforceable guardrails and help mitigate risk.

A Cybersecurity Paradox: Even Resilient Organizations Are Blind to AI Threats

Dark Reading

What qualities do cyber-resilient organizations possess? Tenable CSO Bob Huber tells Dark Reading, "Leaders at resilient organizations understand that cybersecurity risk is business risk. They are able to adapt quickly to ensure continued operations and work with partners to surge resources as required. Above all, cyber-resilient organizations have leaders who are able to manage stress effectively while providing their teams the necessary resources and autonomy to execute effectively."

Last-Minute Funding Uncertainty for Key Cyber Program Spooks Industry

The Wall Street Journal

The near-closure of the Common Vulnerabilities and Exposures (CVE) program sparked concerns from the cybersecurity industry about its operation. Tenable CSO Bob Huber tells The Wall Street Journal that a public-private partnership is likely needed to spread responsibility, enhance the program and benefit the security industry, as well as national security.

If You Deleted This Weird New Folder in Windows, You Need to Put It Back. Here's How

CNET

Senior staff research engineer Satnam Narang shares insights on the curiously empty folder, labeled "inetpub," Microsoft added in the latest Windows 11 update. 

Why firms need ‘exposure management’ to reduce cyber risk for cloud and AI

The Guardian

Interview with Liat Hayun discussing how cloud apps and AI tools create potentially harmful gaps in a company’s security infrastructure.

Ivanti confirms the exploitation of two new vulnerabilities

Le Mag IT

Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.

Prevention is better than cure when it comes to cybersecurity

Just Auto

In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.

Ep 182: AI Efficiencies in Cyber – A Double-Edged Sword

Everyday AI

CTO Glen Pendley was interviewed on the Everyday AI podcast this week, talking about generative AI use cases for cyber defenders, highlighting Tenable ExposureAI, which helps customers search faster, analyze faster and make decisions faster.

Patch Tuesday December 2023

IT Pro

Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.

Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences

Tahawultech News

A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.

Tenable CEO Amit Yoran on rising cyber threats and state of data security

CNBC Worldwide Exchange

Amit Yoran, CEO of Tenable, discusses the cybersecurity landscape following a recent string of cyberattacks.

Satnam Narang on metaverse threats

TickerTV
Satnam Narang spoke to Ticker News Australia about what cyber threats in the metaverse might look like as more NFT projects promote integrations in this space. He also shared findings from his new research showing that scammers are hacking verified and unverified accounts to steal popular NFTs.

Marty Edwards reflects on the one year anniversary of the Colonial Pipeline attack

KBKast
Marty Edwards speaks to Karissa Breen about some of the learnings the attack on Colonial Pipeline brought to light in the wider industry.

A year after the Colonial Pipeline attack – have we learnt anything?

Times of India
Dick Bussiere says the Colonial Pipeline demonstrates how critical privately-owned infrastructure is, and how much of an impact an attack on such infrastructures can have on a country’s economy.

One year on from the attack on Colonial Pipeline - have we learnt anything?

Ticker Insight
Marty Edwards discusses what organisations have and have not learnt from the cyberattack from a year ago.

Marty Edwards discusses how operational environments have changed

Ticker News
Marty Edwards discusses what organisations in Australia should focus on given the flurry of alerts coming from the Australian Cyber Security Centre and Part 2 of the Critical Infrastructure Bill in the wake of recent events.

Beware of the Tinder swindler: How romance scams hit record high of $1.3 billion in 2021

Times of India
Satnam Narang explains how scammers abuse the currency of trust.

We Must Develop Guidance and Best Practices for Securing Critical Infrastructure

Morning Consult
Eitan Goldstein calls for guidance and best practices to secure national critical infrastructure.

Australia's Assistance And Access Bill Increases Risks Of Cyber Attacks

Forbes
Amit Yoran discusses the dangers of Australia's Assistance and Access Bill, widely recognized as an “anti-encryption” law.

Looming Cybersecurity Battle: Who Protects U.S. Pipelines?

Bloomberg BNA
In Bloomberg, Eitan Goldstein explains how OT assets form an integral part of the modern attack surface.

RSA: Major tech companies band together to fight cyber-attacks

SC Magazine UK
Amit Yoran explains why Tenable signed a watershed agreement with leading tech companies to fight against cyberattacks.

Facebook, Microsoft, and 32 other tech firms sign cybersecurity pledge

Venture Beat
Tenable's new industry pact with 33 other leading tech companies is featured in VentureBeat.

Parsing the Russian sanctions, hacking accusations

Politico
Amit Yoran speaks to Politico about attempted attacks against U.S. critical infrastructure.

Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition

CNBC Worldwide Exchange

Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars. 
 

Most online Exchange Servers vulnerable to ProxyLogon still not remediated

SC Media

Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research. 

 

Zero-day vulnerability in SonicWall SMA series under attack

TechTarget

SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
 

While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.

"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."

The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100

CRN

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

China's cyber intrusions took a sinister turn in 2024

The Register

"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.

 

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

Satnam Narang discusses key findings from Tenable Threat Landscape Retrospective report

TickerTV Australia
Satnam Narang spoke to TickerTV Australia live on Tuesday about the key findings from the Tenable Threat Landscape report. He says “haste makes waste” hence why it’s important for cyber defenders to pause and reflect in order to better secure organisations in 2021.

Ransomware attacks now to blame for half of healthcare data breaches

ZDNet
Tenable Threat Landscape Retrospective Report reveals almost half of all data breaches in hospitals and the wider healthcare sector are as a result of ransomware attacks.

Coming in at number 5, it's a blast from the past! Tenable's 2020 security flaw chart show features hits of yesteryear

The Register
News coverage of Tenable's Threat Landscape Retrospective report, picking up on the top 5 vulnerabilities to address.

Why Gen Z traders are turning to TikTok for stock tips and money advice

Daily Telegraph
Satnam Narang's research into TikTok scams referenced in this news story on FinTok scams on the same platform.

Pornbots are taking over Instagram – but how do they work?

The Metro
Feature looking at Pornbots references Tenable's research into Instagram porn bot spam.

When Your Last $166 Vanishes: ‘Fast Fraud’ Surges on Payment Apps

The New York Times
Satnam Narang's Cash App scam research is featured in the New York Times.

AI could revolutionize the IT department but companies need to consider data risks, says expert

IT Pro

Speaking with IT Pro deputy CTO Gavin Millard urged businesses to draw up plans for AI adoption to avoid playing catch-up down the line.

Le Grand Témoin : Amit Yoran Tenable

Informatique News
In an interview with Informatique News, Amit Yoran on the growing importance of preventive security platforms that address the entire attack surface.

Microsoft November 2022 Patch Tuesday addresses six exploited zero-days

Computing
Satnam Narang takes a look at this month's Patch Tuesday update.

Microsoft serves smorgasbord of six zero-days

Computer Weekly
Satnam Narang takes a closer look and this month's Patch Tuesday update, offering his analysis of the vulnerabilities addressed.

Cyber threats to Europe’s grid: Utilities rethink strategy

Computer Weekly
Bernard Montel, EMEA Technical Director and Cybersecurity Strategist, discusses the cyber threat to the utility sector.

Connected EVs are prime targets for a new era of cyber attacks, opinion

Automotive Management
Bernard Montel, EMEA Technical Director and Cybersecurity Strategist, discusses the cyber threat to electric vehicles.

Media contacts

Corporate Public Relations [email protected]
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Offleash
[email protected]
UK
Brands2Life
[email protected]
+44 (0)20 7592 1200
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Kit média

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets