Media room
Tenable news, announcements and global media coverage
Bienvenue dans la salle des médias de Tenable. Consultez nos dernières annonces et bénéficiez de notre couverture médiatique, accédez à nos coordonnées dans le monde et téléchargez notre kit média ci-dessous.
Get the latest Tenable news
Des versions produit innovantes aux rapports d'étude du secteur, en passant par les partenariats stratégiques, bénéficiez des actualités et des annonces officielles les plus récentes, directement dans votre boîte aux lettres.
Communiqués de presse
Cloud security: an identity problem - Security Insights
Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.
- Cyber Breaches
- Cyber Exposure Live
- Cyber Policy
- Cybersecurity
- Products
- Vulnerability Management
What Will The NIS2 Directive Mean For Smaller Organisations?
In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention
In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.
- Cyber Breaches
- Cybersecurity
- Products
- Vulnerability Management
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Scammers Litter Dating Apps With AI-Generated Profile Pics
Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."
- Business
- Cybersecurity
Microsoft says US rivals are beginning to use generative AI in offensive cyber operations
Microsoft and OpenAI said that U.S. adversaries — chiefly Iran and North Korea, and to a lesser extent Russia and China — are beginning to use their generative AI models to mount or organize offensive cyber operations. Amit Yoran, CEO of Tenable, tells AP, “Of course bad actors are using large-language models — that decision was made when Pandora’s Box was opened."
- Cybersecurity
Satnam Narang talks about the ransomware boom
TickerTV •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Azure issues not adequately fixed for months, complain bug hunters
The Register •- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Satnam Narang on metaverse threats
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
OT security coalition aims to bolster industrial cybersecurity
The Daily Swig •- Business
- Cybersecurity
- Energy
- Vulnerability Management
Bridging the skills gap in the cybersecurity sector: are businesses ready to change?
Global Banking & Finance Review •- Business
- Cybersecurity
Revealed: 30 Top Female Cybersecurity Leaders 2022
Computer Weekly •- Business
- Cybersecurity
Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations
The Daily Swig •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Ransomware attacks now to blame for half of healthcare data breaches
ZDNet •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Coming in at number 5, it's a blast from the past! Tenable's 2020 security flaw chart show features hits of yesteryear
The Register •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Why Gen Z traders are turning to TikTok for stock tips and money advice
Daily Telegraph •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Top Workplaces 2020
The Washington Post •- Corporate News
Keeping Data Safe at Home
MarketWatch •- Business
- Corporate News
How hackers are trying to cast their ballots for president this election season
CNBC •- Cyber Breaches
- Cyber Policy
- Government
SWIFT security controls to be mandatory by 2018
TechTarget •- Cyber Policy
- Finance
Government guidance is helping CISOs impose controls on DevOps' cloud flexibility
CSO Australia •- Cyber Policy
- Cybersecurity
- Vulnerability Management
Cyber-Warfare: Securing our Nation’s Defense
Federal News Radio •- Cyber Policy
- Government
- Vulnerability Management
Tenable co-founder and COO Jack Huffard talks modern network security
ITWire •- Cyber Policy
- Finance
- Government
- Products
- Vulnerability Management
How the Cybersecurity Defense-in-Depth Model Fails Agencies
Federal News Radio •- Cyber Policy
- Government
- Vulnerability Management
Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation
Security Week •A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.
- Business
- Cybersecurity
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ep 182: AI Efficiencies in Cyber – A Double-Edged Sword
Everyday AI •CTO Glen Pendley was interviewed on the Everyday AI podcast this week, talking about generative AI use cases for cyber defenders, highlighting Tenable ExposureAI, which helps customers search faster, analyze faster and make decisions faster.
- Business
- Cybersecurity
Frontline Defence
Innovation •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Pick your battles: cybercriminals are outspending you 11 to 1
CSO Australia •- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
How much does it cost to launch a cyberattack?
CSO Online •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Vulnerability Values Fluctuate Between White, Grey and Black Hats
Infosecurity Magazine •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Tenable declares there are far worse security threats to fear than zero-day exploits
IT Pro •- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Professional cyber criminals command $75k per annum
Computer Weekly •- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Microsoft stomps on 48 bugs in February Patch Tuesday update
Computer Weekly •- Cybersecurity
- Vulnerability Management
Infrastructure-as-Code series - Tenable: The joy of enforced immutability
Computer Weekly •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Satnam Narang discusses 2021 Threat Landscape Retrospective
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Healthcare
- Surveys / Research Data
- Vulnerability Management
Cybercriminals gave government departments a run for their money in 2021
The Mandarin •- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Surveys / Research Data
- Vulnerability Management
FTC: Companies Could Face Legal Action for Failing to Patch Log4j
Dark Reading •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
What will happen to cybersecurity in 2022?
IDG Connect •- Cybersecurity
- Vulnerability Management
Media contacts
Kit média
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.