Media room
Tenable news, announcements and global media coverage
Bienvenue dans la salle des médias de Tenable. Consultez nos dernières annonces et bénéficiez de notre couverture médiatique, accédez à nos coordonnées dans le monde et téléchargez notre kit média ci-dessous.
Get the latest Tenable news
Des versions produit innovantes aux rapports d'étude du secteur, en passant par les partenariats stratégiques, bénéficiez des actualités et des annonces officielles les plus récentes, directement dans votre boîte aux lettres.
Communiqués de presse
Tenable Wins AI Security Category in the 2025 Cybersecurity Excellence Awards
Tenable Empowers erex with Continuous Cybersecurity Protection, Eliminating Costly Outsourcing
Tenable Achieves FedRAMP Authorization for Tenable One and Tenable Cloud Security
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management
Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.
The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target.
- Corporate News
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers
One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.
According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.
- Cyber Breaches
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
SC Media •Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
Tenable integrates DSPM, AI-DSPM to cloud security platform
SC Media •Exposure management provider Tenable has introduced new data security posture management and artificial intelligence security posture management capabilities to its Tenable Cloud Security platform. The updates, available to Tenable Cloud Security and Tenable One customers, address the increasing complexity of cloud environments, which often face risks from misconfigurations, overexposed workloads, and excessive privileges. Tenable Research identified that 38% of organizations struggle with a "toxic cloud triad" -- a combination of exposed, vulnerable, and highly privileged cloud workloads.
- Business
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable
Channel Biz •In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region
- Business
- Cybersecurity
- Vulnerability Management
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
Techopedia •In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Tenable launches LLM-powered ExposureAI product
TechTarget •- Corporate News
- Cybersecurity
- Products
Satnam Narang discusses insights from 2022 Threat Landscape Report
Ticker Insight •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Satnam Narang provides insights into old and new threats within the metaverse
Ticker Insight •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Tenable One offers MSSPs unified cyber exposure visibility, Tenable says
IT Europa •- Business
- Corporate News
- Cybersecurity
Satnam Narang breaks down how Pig Butchering scams work
Ticker Insight •- Business
- Corporate News
- Cybersecurity
Vallourec better secures Microsoft's Active Directory with Tenable
Solutions Numeriques •- Business
- Corporate News
- Cybersecurity
Nationale Cybersicherheitsstrategie erfordert Cyberhygiene
ZDNet •- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Glen Pendley on transparency from cloud infrastructure providers
TickerTV •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Marty Edwards discusses how operational environments have changed
Ticker News •- Business
- Corporate News
- Cyber Policy
- Cybersecurity
FTC: Companies Could Face Legal Action for Failing to Patch Log4j
Dark Reading •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Tenable commends Australia's Ransomware Action Plan
TickerTV Australia •- Business
- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
- Vulnerability Management
Software Industry Awaits Details on Biden’s Order to Report Hacks
The Wall Street Journal •- Cyber Policy
- Government
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
CNBC Worldwide Exchange •Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
SC Media •Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
Zero-day vulnerability in SonicWall SMA series under attack
TechTarget •SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
CRN •Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
China's cyber intrusions took a sinister turn in 2024
The Register •"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Apple warns 2 macOS zero-day vulnerabilities under attack
TechTarget •The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
Satnam Narang provides insights into old and new threats within the metaverse
Ticker Insight •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Satnam Narang talks about the ransomware boom
TickerTV •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Satnam Narang on metaverse threats
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Satnam Narang discusses 2021 Threat Landscape Retrospective
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Healthcare
- Surveys / Research Data
- Vulnerability Management
Cybercriminals gave government departments a run for their money in 2021
The Mandarin •- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Surveys / Research Data
- Vulnerability Management
Scammer use YouTube Shorts for posting stolen videos from TikTok: Report
The Economic Times of India •- Corporate News
- Cybersecurity
- Surveys / Research Data
Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention
Global Security Mag •In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.
- Cyber Breaches
- Cybersecurity
- Products
- Vulnerability Management
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
Techopedia •In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Exclusive Feature: Data Privacy
Tahawultech News •Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately
IT Pro •Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.
- Business
- Cybersecurity
- Vulnerability Management
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Media contacts
Kit média
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.