Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Bienvenue dans la salle des médias de Tenable. Consultez nos dernières annonces et bénéficiez de notre couverture médiatique, accédez à nos coordonnées dans le monde et téléchargez notre kit média ci-dessous.

Get the latest Tenable news

Des versions produit innovantes aux rapports d'étude du secteur, en passant par les partenariats stratégiques, bénéficiez des actualités et des annonces officielles les plus récentes, directement dans votre boîte aux lettres.

S'abonner

Communiqués de presse

Columbia, MD

Tenable Completes Acquisition of Vulcan Cyber

Columbia, MD

Tenable Plans to Acquire Vulcan Cyber, Accelerate Leadership in Exposure Management

Columbia, MD

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

Columbia, MD

Tenable Announces the Passing of Chairman and CEO Amit Yoran

Columbia, MD

Tenable Security Center fournit une priorisation des vulnérabilités dédiée pour éliminer les expositions critiques qui augmentent le risque business

Columbia, MD

Tenable ajoute la gestion des correctifs pour éliminer encore plus rapidement les expositions de sécurité


Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition

CNBC Worldwide Exchange

Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars. 
 

Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management

Data Breach Today

Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.

The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target. 

Most online Exchange Servers vulnerable to ProxyLogon still not remediated

SC Media

Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research. 

 

One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers

The Register

One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.

According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.

Zero-day vulnerability in SonicWall SMA series under attack

TechTarget

SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
 

While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.

"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."

The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100

CRN

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition

CNBC Worldwide Exchange

Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars. 
 

Most online Exchange Servers vulnerable to ProxyLogon still not remediated

SC Media

Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research. 

 

Tenable integrates DSPM, AI-DSPM to cloud security platform

SC Media

Exposure management provider Tenable has introduced new data security posture management and artificial intelligence security posture management capabilities to its Tenable Cloud Security platform. The updates, available to Tenable Cloud Security and Tenable One customers, address the increasing complexity of cloud environments, which often face risks from misconfigurations, overexposed workloads, and excessive privileges. Tenable Research identified that 38% of organizations struggle with a "toxic cloud triad" -- a combination of exposed, vulnerable, and highly privileged cloud workloads.

 

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums

TickerTV

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.

“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable

Channel Biz

In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region

What Will The NIS2 Directive Mean For Smaller Organisations?

Cyber Security Intelligence

In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline

Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management

Data Breach Today

Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.

The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target. 

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums

TickerTV

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.

Companies Address Impact of Exploited Libwebp Vulnerability

Security Week

With so many questions around the exploited Lipwebp vulnerability, Tenable’s Satnam Narang answers frequently asked questions. 

Tenable to Buy Startup Ermetic for $265M to Safeguard Clouds

ISMG
Tenable plans to purchase a cloud security startup founded by the longtime leader of Secdo to help security teams make efficient and accurate remediation decisions.

Tenable’s $265M Ermetic Acquisition Deal: 5 Things To Know

CRN
For Tenable, the expansion of its offering with Ermetic’s identity-driven cloud security capabilities will enable the company to “deliver a holistic view of the modern attack surface and help organizations reduce exposure and risk, using identity as an essential foundation,” Tenable CEO Amit Yoran said in a news release.

Tenable launches LLM-powered ExposureAI product

TechTarget
ExposureAI will be integrated into Tenable One, the vendor's encompassing exposure management platform, and is the latest cybersecurity produce to employ large language models.

Cloud security: an identity problem - Security Insights

Security Insights

Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.

What Will The NIS2 Directive Mean For Smaller Organisations?

Cyber Security Intelligence

In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline

Supporting CISA - The 'Focal Point of Our Defensive Efforts'

ISMG

Tenable Chairman and CEO Amit Yoran called on Congress to prioritize funding for the Cybersecurity and Infrastructure Security Agency (CISA).

As Congress weighs budget priorities, top cyber execs urge CISA funding support

Cybersecurity Dive

The group, led by Tenable CEO Amit Yoran, raised concerns that significant cuts to the agency would undermine efforts to combat rising threats to critical infrastructure and federal systems.

A look at new in the NIS2 Directive

Manufacturing and Logistics IT

In a Q&A with Manufacturing and Logistics IT technical director Bernard Montel takes a deep dive into the changes that manufacturers can expect in the NIS2 Directive.

AI could revolutionize the IT department but companies need to consider data risks, says expert

IT Pro

Speaking with IT Pro deputy CTO Gavin Millard urged businesses to draw up plans for AI adoption to avoid playing catch-up down the line.

Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition

CNBC Worldwide Exchange

Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars. 
 

Most online Exchange Servers vulnerable to ProxyLogon still not remediated

SC Media

Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research. 

 

Zero-day vulnerability in SonicWall SMA series under attack

TechTarget

SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
 

While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.

"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."

The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100

CRN

Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN

China's cyber intrusions took a sinister turn in 2024

The Register

"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.

 

Apple warns 2 macOS zero-day vulnerabilities under attack

TechTarget

The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.

Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.

"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."

IoT Unplugged – S3:E7 – Establishing priorities for Cloud security

IoT Insider

In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums

TickerTV

Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.

Cyberattacks breaching defences on massive scale

Computing Security

In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.

Prevention is better than cure when it comes to cybersecurity

Just Auto

In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.

Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences

Tahawultech News

A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.

Satnam Narang discusses insights from 2022 Threat Landscape Report

Ticker Insight
Satnam Narang discusses insights from 2022 Threat Landscape Report

Apple sends out iPhone spyware warnings in 92 countries: What you need to know

The National

Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.

Two zero-days fixed in Microsoft's Patch Tuesday update

Computing

Speaking about this month's Patch Tuesday, senior staff research engineer Satnam Narang told Computing that the update is a reminder that flaws in Secure Boot persist and we could see more malicious activity related to Secure Boot in the future.

“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable

Channel Biz

In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region

Cloud security: an identity problem - Security Insights

Security Insights

Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.

What Will The NIS2 Directive Mean For Smaller Organisations?

Cyber Security Intelligence

In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline

Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention

Global Security Mag

In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.


Media contacts

Corporate Public Relations [email protected]
(443) 545-2102 ext. 1544
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Mission North
[email protected]
(415) 503-1818
UK
Flame PR
[email protected]
+44 20 3357 9740
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Kit média

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy