Media room
Tenable news, announcements and global media coverage
Bienvenue dans la salle des médias de Tenable. Consultez nos dernières annonces et bénéficiez de notre couverture médiatique, accédez à nos coordonnées dans le monde et téléchargez notre kit média ci-dessous.
Get the latest Tenable news
Des versions produit innovantes aux rapports d'étude du secteur, en passant par les partenariats stratégiques, bénéficiez des actualités et des annonces officielles les plus récentes, directement dans votre boîte aux lettres.
Communiqués de presse
Tenable Plans to Acquire Vulcan Cyber, Accelerate Leadership in Exposure Management
Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
Tenable Security Center fournit une priorisation des vulnérabilités dédiée pour éliminer les expositions critiques qui augmentent le risque business
Tenable ajoute la gestion des correctifs pour éliminer encore plus rapidement les expositions de sécurité
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management
Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.
The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target.
- Corporate News
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
One of Salt Typhoon's favorite flaws still wide open on 91% of at-risk Exchange Servers
One of the critical security flaws exploited by China's Salt Typhoon to breach US telecom and government networks has had a patch available for nearly four years - yet despite repeated warnings from law enforcement and private-sector security firms, nearly all public-facing Microsoft Exchange Server instances with this vulnerability remain unpatched.
According to cyber-risk management firm Tenable, 91 percent of the nearly 30,000 openly reachable instances of Exchange vulnerable to CVE-2021-26855, aka ProxyLogon, have not been updated to close the hole.
- Cyber Breaches
Zero-day vulnerability in SonicWall SMA series under attack
SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
CNBC Worldwide Exchange •Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
SC Media •Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
Tenable integrates DSPM, AI-DSPM to cloud security platform
SC Media •Exposure management provider Tenable has introduced new data security posture management and artificial intelligence security posture management capabilities to its Tenable Cloud Security platform. The updates, available to Tenable Cloud Security and Tenable One customers, address the increasing complexity of cloud environments, which often face risks from misconfigurations, overexposed workloads, and excessive privileges. Tenable Research identified that 38% of organizations struggle with a "toxic cloud triad" -- a combination of exposed, vulnerable, and highly privileged cloud workloads.
- Business
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable
Channel Biz •In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region
- Business
- Cybersecurity
- Vulnerability Management
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Tenable's $150M Vulcan Cyber Buy Boosts Exposure Management
Data Breach Today •Tenable plans to purchase an exposure management startup led by a former Israeli intelligence officer to more effectively integrate telemetry data from third-party security products.
The Baltimore, Maryland-based vendor said its proposed $150 million acquisition of Tel Aviv, Israel-based Vulcan Cyber will help CISOs gain a unified view of risk through its more than 100 third-party integrations across endpoint security, cloud security and threat intelligence, according to co-CEO and COO Mark Thurmond. He said Vulcan's reputation in performance, scalability and integrations made them an appealing target.
- Corporate News
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Companies Address Impact of Exploited Libwebp Vulnerability
Security Week •With so many questions around the exploited Lipwebp vulnerability, Tenable’s Satnam Narang answers frequently asked questions.
- Corporate News
- Cybersecurity
Tenable to Buy Startup Ermetic for $265M to Safeguard Clouds
ISMG •- Corporate News
- Cybersecurity
Tenable’s $265M Ermetic Acquisition Deal: 5 Things To Know
CRN •- Corporate News
- Cybersecurity
Tenable launches LLM-powered ExposureAI product
TechTarget •- Corporate News
- Cybersecurity
- Products
Cloud security: an identity problem - Security Insights
Security Insights •Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.
- Cyber Breaches
- Cyber Exposure Live
- Cyber Policy
- Cybersecurity
- Products
- Vulnerability Management
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Supporting CISA - The 'Focal Point of Our Defensive Efforts'
ISMG •Tenable Chairman and CEO Amit Yoran called on Congress to prioritize funding for the Cybersecurity and Infrastructure Security Agency (CISA).
- Cyber Policy
- Cybersecurity
- Government
As Congress weighs budget priorities, top cyber execs urge CISA funding support
Cybersecurity Dive •The group, led by Tenable CEO Amit Yoran, raised concerns that significant cuts to the agency would undermine efforts to combat rising threats to critical infrastructure and federal systems.
- Cyber Policy
- Cybersecurity
A look at new in the NIS2 Directive
Manufacturing and Logistics IT •In a Q&A with Manufacturing and Logistics IT technical director Bernard Montel takes a deep dive into the changes that manufacturers can expect in the NIS2 Directive.
- Cyber Policy
- Cybersecurity
- Energy
- Vulnerability Management
AI could revolutionize the IT department but companies need to consider data risks, says expert
IT Pro •Speaking with IT Pro deputy CTO Gavin Millard urged businesses to draw up plans for AI adoption to avoid playing catch-up down the line.
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
CNBC Worldwide Exchange •Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
SC Media •Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
Zero-day vulnerability in SonicWall SMA series under attack
TechTarget •SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
CRN •Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
China's cyber intrusions took a sinister turn in 2024
The Register •"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Apple warns 2 macOS zero-day vulnerabilities under attack
TechTarget •The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
IoT Unplugged – S3:E7 – Establishing priorities for Cloud security
IoT Insider •In this episode of the IoT Insider podcast, Bernard Montel provides a brief history of the evolution of the Cloud and the challenges of securing it.
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums
TickerTV •Tenable's Scott McKinnel discusses how preventive cybersecurity can reduce insurance premiums.
- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Tahawultech News •A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Satnam Narang discusses insights from 2022 Threat Landscape Report
Ticker Insight •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Apple sends out iPhone spyware warnings in 92 countries: What you need to know
The National •Staff research engineer, Scott Caveza, told The National that Apple’s latest action of informing users that their devices may have been targeted is concerning, but encouraging.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Two zero-days fixed in Microsoft's Patch Tuesday update
Computing •Speaking about this month's Patch Tuesday, senior staff research engineer Satnam Narang told Computing that the update is a reminder that flaws in Secure Boot persist and we could see more malicious activity related to Secure Boot in the future.
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
“Our ecosystem is made up of GSI and MSSP”: Johann Demangeot, Country Manager France at Tenable
Channel Biz •In an interview with Channel Biz Johann Demangeot, senior sales director EMEA South, discusses Tenable's channel strategy in the region
- Business
- Cybersecurity
- Vulnerability Management
Cloud security: an identity problem - Security Insights
Security Insights •Tenable's Jennifer Cox was recently interviewed for the Security Insights podcast discussing the role identity plays in cloud security.
- Cyber Breaches
- Cyber Exposure Live
- Cyber Policy
- Cybersecurity
- Products
- Vulnerability Management
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention
Global Security Mag •In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.
- Cyber Breaches
- Cybersecurity
- Products
- Vulnerability Management
Media contacts
Kit média
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.