فيسبوك جوجل بلس تويتر ينكدين موقع YouTube RSS قائمة الطعام بحث المورد - مدونةالمورد - ندوة عبر الإنترنتالمورد - تقريرالمورد - الحدثicon_066 أيقونات_067icon_068icon_069icon_070

Media room

Tenable news, announcements and global media coverage

Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.

Get the latest Tenable news

From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.

يشترك

البيانات الصحفية

كولومبيا، ميريلاند

Tenable Unveils Comprehensive Web Application and API Scanning Capabilities for Nessus Expert

كولومبيا، ميريلاند

Tenable Sweeps CRN Annual Report Card Award for Third Consecutive Year

COLUMBIA, Md. and Black Hat USA

دمج قدرات الذكاء الاصطناعي التوليدية عبر منصة الأمن الإلكتروني بإطلاق ExposureAI

كولومبيا، ميريلاند

Tenable Enhances OT Security To Give Organizations the Most Comprehensive Visibility and Management of IT/OT Devices in Operational Environments

كولومبيا، ميريلاند

Tenable Improves Shift-Left Cloud Security to Prevent Vulnerable Containers From Reaching Runtime

Tokyo, Japan

Proprietary Research from Tenable Calculates External Attack Surface of Japan’s Largest Organizations


Glen Pendley discusses Exposure Management

TickerTV

EDF: can cyberattacks worsen the energy crisis this winter?

La Tribune
Bernard Montel is quoted as a cybersecurity expert in this report by La Tribune discussing the impact cyberattacks could have during this winter's energy crisis.

Tenable、「Tenable One」を提供開始--攻撃経路の検出と効率的なリスク管理を支援

ZDNet Japan

「アタックサーフェス」とは何か--セキュリティの新しい言葉

ZDNet Japan

Cyber threats to Europe’s grid: Utilities rethink strategy

Computer Weekly
Bernard Montel, EMEA Technical Director and Cybersecurity Strategist, discusses the cyber threat to the utility sector.

Connected EVs are prime targets for a new era of cyber attacks, opinion

Automotive Management
Bernard Montel, EMEA Technical Director and Cybersecurity Strategist, discusses the cyber threat to electric vehicles.

Tenable buys Indegy to integrate IT and OT security

Computer Weekly
Tenable is to acquire operational technology (OT) and industrial network security specialist Indegy.

Experts Expect “Aggressive Exploitation” of Two Apache Solr Vulnerabilities

Computer Business Reivew
Satnam Narang speaks about vulnerabilities in Apache Solr.

Beware of Juice Jacking: Charging phones at public USB charging stations could be dangerous

TEISS
Satnam Narang explains how Juice Jacking works, particularly the risks posed from malware in public USB ports at charging stations.

What is juice jacking and should you stop phone charging at airports?

Verdict
Following a warning from the District Attorney's Office in LA, Satnam Narang warns of the dangers from malware transferred via juice jacking.

How much does it cost to launch a cyberattack?

CSO Online
Oliver Rochford discusses his latest research report - 'How Lucrative are Vulnerabilities'.

Vulnerability Values Fluctuate Between White, Grey and Black Hats

Infosecurity Magazine
Oliver Rochford tells Infosecurity Magazine how criminals monetize their efforts and advises companies to harden their attack surface.

Microsoft Blasts Google for Early Disclosure of Windows Bug

eWEEK
Cris Thomas offers perspective on Google's early disclosure of a Windows zero-day vulnerability in eWEEK, highlighting the struggle between vendors and security researchers on disclosure times.

Tenable ate FlawCheck for DevOps enhancement

The Register
Renaud Deraison tells The Register that the emergence of DevOps led Tenable to acquire FlawCheck, a container security company that makes the development and deployment of containers into enterprise environments more secure.

Tenable Network Security makes first acquisition

The Baltimore Sun
Sarah Gantz of The Baltimore Sun spoke with Renaud Deraison about the significance of Tenable's acquisition of container security company FlawCheck.

Tenable brings network visibility into Google Cloud Platform

InfoWorld
InfoWorld's Fahmida Rashid highlights the technology integration between Tenable Network Security and Google Cloud Platform, giving customers unified visibility into their cloud and hybrid environment.

Tenable partners with Google to unburden security managers

Security Brief NZ
The new technology partnership between Tenable Network Security and Google Cloud Platform is featured in New Zealand's Security Brief, highlighting the integrations' security benefits for cloud and hybrid customers.

Dave Cole Joins Tenable Network Security as Chief Product Officer

GovCon Wire
GovConWire's Dominique Stump highlights Tenable's commitment to transforming security technology with the hiring of Dave Cole as chief product officer.

Security in the metaverse, hyper-personalisation and how world events influence cyber incidents

2Factors
Tenable's Scott McKinnel on 2Factors with Karissa A. Breen discusses security in the metaverse, hyper-personalisation and how world events influence cyber incidents. Great watch!

Inspirational Woman: Ciara Campbell | Senior Security Engineer, Tenable

We Are Tech Women
Ciara Campbell interviewed as an inspirational woman in technology.

Satnam Narang talks about the ransomware boom

TickerTV
Satnam Narang, senior staff research engineer sheds light into the various players within the ecosystem and the extortion tactics that have emerged since double extortion was made popular three years ago by the Maze ransomware group.

Six défis de l'entreprise connectée selon le risk management

Les Echos
Bernard Montel discusses the cyberthreats to modern infrastructure.

Microsoft silent patches called “a grossly irresponsible policy”

IT Pro
Amit Yoran points to Microsoft's repeated pattern of behaviour in response to vulnerability disclosures.

Patch Tuesday dogged by concerns over Microsoft vulnerability response

Computer Weekly
Claire Tills unpicks the latest Microsoft Patch Tuesday update.

German IT Security Ahead of UK

Computer Weekly
Gavin Millard breaks down the results of Tenable's security survey of UK and German organizations, touching on the importance of vulerability patching.

Visualizing Security Metrics

Bank Info Security
Gavin Millard explains the importance of metrics and dashboards to CISOs.

Venom Vulnerability: Toxic Threat or Hissing Hyperbole

SC Magazine UK
Gavin Millard explains the Venom vulnerability in comparison with other recently disclosed major vulnerabilities.

Experts' Opinions Mixed On Venom Vulnerability

Dark Reading
Cris Thomas explains the context surrounding the Venom vulnerability and the potential effects it could have if exploited.

New Bugs Uncovered in Encryption Software

Reuters
Cris Thomas shares insight on the OpenSSL bug with Reuters' Jim Finkle and Eric Auchard.

Why Be Normal? Especially if you Don’t Know What Normal is!

SecurityWeek
Marcus Ranum’s latest blog in his series on metrics posted on SecurityWeek, discussing establishing what normal is when it comes to system metrics.

Call for comments: European Data Protection Board lays out data breach notification guidelines for organizations

The Daily Swig
Security experts, including Adam Palmer, react to EU's data breach notification guidelines.

Amit Yoran discusses cyber risk with CNBC Squawk Box

CNBC SquawkBox Europe
Amit Yoran explains that cyber risk is business risk and that cyber exposure will arm the C-Suite.

Exploitation of Cisco Security Manager RCE flaws ‘imminent’

The Daily Swig
Rody Quinlan explains that the vulnerabilities are relatively easy to exploit and present multiple attack vectors.

The Future Of Cybersecurity Law Hinges On The Supreme Court

Forbes
Amit Yoran discusses the impending US Supreme Court case discussing the Computer Fraud and Abuse Act.

Successfully Connecting Cybersecurity To The Finance Function

Finance Monthly
Co-authored byline from Adam Palmer discussing the benefits of CFOs and other executives involving cybersecurity in their roles.

Microsoft emits 112 security hole fixes – including the cure for a Google-disclosed kernel vuln exploited in the wild

The Register
Satnam Narang explains how CVE-2020-17087 was chained with CVE-2020-15999 to create an attack seen in the wild.

Media contacts

Corporate Public Relations [email protected]
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Offleash
[email protected]
UK
Brands2Life
[email protected]
+44 (0)20 7592 1200
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

مجموعة وسائل الإعلام

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets