Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Media Room

Tenable News, Announcements and Global Media Coverage

Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.

Get the latest Tenable News

From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.

Subscribe

Press Releases

View Financial News Releases
Columbia, MD
July 1, 2021

Tenable Selected as BeyondTrust’s Technology Alliances Partner of the Year

Columbia, MD
June 21, 2021

Media Alert: Tenable Recognized as a 2021 ‘Top Workplace’ by The Washington Post for Third Year in a Row

Staines-on-Thames, UK
June 10, 2021

Tenable.io Named Best Vulnerability Management Solution at SC Awards Europe 2021

Columbia, MD
June 10, 2021

Tenable Partners with CyberNB to Secure Canada’s Critical Infrastructure

Columbia, MD
June 7, 2021

Tenable Teams with Deloitte to Secure Fortune 500 Manufacturing Environments

München, Deutschland
June 2, 2021

Tenable Ernennt Roger Scheer Zum Regional Vice President of Central Europe

News

Millions of home Wi-Fi routers under attack by botnet malware — what you need to know

Tom's Guide
Tom's Guide highlights a vulnerability Tenable Research found in home routers that could leave millions exposed.

Decade-Old Router Bug Could Affect Millions of Devices

Infosecurity Magazine
Vulnerability in Arcadyan firmware, discovered by Tenable Zero-Day Team, highlights the inherent risks in code supply chains and vulnerable software libraries.

Got a cheap Cisco router in your home office? If it's one of these, there's an exposed RCE hole you need to plug

The Register
Satnam Narang warns that attackers favour vulnerabilities in VPN devices.

Decade-long vulnerability in multiple routers could allow network compromise

The Daily Swig
Devices using Arcadyan software are at risk from vulnerability discovered by Tenable's staff research engineer, Evan Grant.

Indictments, Attribution Unlikely to Deter Chinese Hacking, Researchers Say

Threatpost
Amit Yoran explains that while governments focus on cyberattack attribution and prosecution, organizations still have a duty of care to secure their systems.

PrintNightmare haunts Microsoft as patch may miss mark

Computer Weekly
Satnam Narang warns of the prospect attackers could exploit PrintNightmare to take over a domain controller.

CFOs Should Lean into Cybersecurity Issues

CFO Australia
Steve Vintz, Tenable CFO, discusses why cyber risk is a business risk and how CFOs can be involved in the cybersecurity conversation.

Redesigning Digital Infrastructure To Support Remote Workforce

Business World CIO
Diwakar Dayal discusses why organisations need to consider redesigning their digital infrastructure to suit the new normal of work.

Our infrastructure needs cyber protection

The Australian
Dick Bussiere shares how the uptake of solar and smart technology in the grid can potentially leave the energy infrastructure more vulnerable.

This ‘EventBot’ banking Trojan can steal money from your phone: What should you do

Indian Express
Adam Palmer shares his thoughts on EventBot – a banking malware capable of stealing financial information and prompting users to give access to their device accessibility services.

Cover Story: Disruptive Potential Emerges For IoT In Australia’s Industrial Internet

Which-50
Dick Bussiere discusses why Australia’s approach to IoT regulation will be important as more enterprises adopt Industrial IoT.

Do we need tougher breach notification rules?

Computing
Jamie Brown discusses UK breach notification laws.

Tenable buys Indegy to integrate IT and OT security

Computer Weekly
Tenable is to acquire operational technology (OT) and industrial network security specialist Indegy.

Beware of Juice Jacking: Charging phones at public USB charging stations could be dangerous

TEISS
Satnam Narang explains how Juice Jacking works, particularly the risks posed from malware in public USB ports at charging stations.

How much does it cost to launch a cyberattack?

CSO Online
Oliver Rochford discusses his latest research report - 'How Lucrative are Vulnerabilities'.

Vulnerability Values Fluctuate Between White, Grey and Black Hats

Infosecurity Magazine
Oliver Rochford tells Infosecurity Magazine how criminals monetize their efforts and advises companies to harden their attack surface.

#EdgeLondon2019: Focus on System and User Hygiene, Not Zero-Days

Infosecurity Magazine
Amit Yoran's keynote at Edge London 2019.

NOT APPY ‘Free TikTok fans’ scams lure kids into downloading dodgy apps and handing over their info

The Sun
Satnam Narang's recent TikTok research follows the rise of spam accounts on the platform.

Fine Time: What GDPR Enforcement Could Look Like

Infosecurity Magazine
Gavin Millard discusses the possible financial impact of GDPR fines.

Tenable CEO doesn't think much of the Equifax, Yahoo cyber breach explanations

Washington Business Journal
Amit Yoran's blunt assessment of major data breaches strikes a cord with a Washington Business Journal reporter.

Equifax feels the heat in Washington for breach

The Hill
Amit Yoran talks with The Hill about the scope and impact of the Equifax data breach.

Cyber CEOs urge NIST Framework be made a part of NAFTA talks

CyberScoop
Amit Yoran speaks to CyberScoop about why the use of cybersecurity frameworks should be incorporated into NAFTA renegotiations.

A new approach to federal cybersecurity, 2 years after the OPM breach

Federal News Radio
In Federal News Radio, John Chirhart recommends taking a modern approach to federal cybersecurity.

Senators want answers on risk of nuclear power plant hacks

CNET
Amit Yoran tells CNET that better security common sense is needed to thwart successful attacks on critical infrastructure.

Decade-long vulnerability in multiple routers could allow network compromise

The Daily Swig
Devices using Arcadyan software are at risk from vulnerability discovered by Tenable's staff research engineer, Evan Grant.

PrintNightmare haunts Microsoft as patch may miss mark

Computer Weekly
Satnam Narang warns of the prospect attackers could exploit PrintNightmare to take over a domain controller.

Vulnerability in Microsoft Teams granted attackers access to emails, messages, and personal files

The Daily Swig
A Tenable Research discovered vulnerability in Microsoft Teams could allow a malicious actor to steal sensitive data and access a victim’s communications.

Microsoft Teams security flaw left users defenseless against serious cyberattacks

Tech Radar Pro
A simple vulnerability in collaboration platform Microsoft Teams, discovered by Tenable Reasearch, could have given attackers the keys to the kingdom.

Microsoft fixes seven zero-days on its Patch Tuesday rounds

Computer Weekly
Satnam Narang warns that, given the vulnerabilities had been exploited in the wild, organizations should apply patches as soon as possible.

Marty Edwards discusses critical infrastructure security with TickerTV Australia

TickerTV Australia
Marty Edwards discusses the reasons critical infrastructure is a valuable target for cybercriminals following the cyberattack on one of the world's largest meat production facilities.

96% of UK Businesses Suffered a Damaging Cyber Attack in the Last Year

Computer Business Review
Findings of the Tenable sponsored Forrester Report, including commentary from Tenable Customer - Lafarge Holcim, advocating a layered approach to cybersecurity.

Almost Half of Businesses Hit By COVID-Related “Business Impacting Cyber-Attack” in 2020

InfoSecurity
Tenable sponsored Forrester report highlights increased cyberattacks using COVID themed activity.

Twitter accounts hacked to promote ‘CryptoForHealth’ Covid-19 scam

Information Age
Satnam Narang explains that the domain connection between the tweets indicates this is a coordinated attack.

Hackers Compromise Twitter Accounts Of Major Public Figures

Silicon
Satnam Narang details how the scams traded on Covid-19 by claiming to provide a bitcoin giveaway.

Celebrities’ accounts hacked in unprecedented Twitter attack

Saudi Gazette
Satnam Narang shares his perspective that these impersonation attacks are fairly common.

Online learning platform TCExam marked down for weak web security

The Daily Swig
Nick Manfredi has discovered multiple vulnerabilities in this e-learning system.

Microsoft fixes four critical bugs on lighter Patch Tuesday

Computer Weekly
Satnam Narang warns that attackers are still looking to exploit Microsoft Exchange Server vulnerabilities.

Achat d’Alsid par Tenable : une opération motivée par la nature critique d’Active Directory

LeMagIT
Renaud Deraison and Emmanuel Gras talk about the combination of Tenable and Alsid.

How to empower your chief information security officer (CISO)

Information Age
Adam Palmer advises CISOs to take a risk-based approach and explain this in the boardroom in the same business terms other functions use and understand.

Hackers exploit Pulse Secure VPN flaws in sophisticated global campaign

IT Pro
Scott Caveza confirms that, alongside the new flaw, attackers were leveraging vulnerabilities previously patched in 2019.

How healthcare organisations can protect themselves from increasing cyberattacks

Business IT
Scott McKinnel discusses how healthcare organisations can secure their infrastructure.

Microsoft patches actively exploited Desktop Window Manager flaw

IT Pro
Satnam Narang explains how two of the four critical vulnerabilities are pre-authentication Exchange server flaws.

Media Contacts

Corporate Public Relations [email protected]
(443) 545-2102 ext. 1544
USA
Mission North
[email protected]
(415) 503-1818
Mexico
coRPKom
[email protected]
+52 55 5280-3977
Brazil
Inpress Porter Novelli
[email protected]
+ 55 11 3323-1627 | 11 99491-0441
UK
Flame PR
[email protected]
+44 20 3357 9740
Germany
Tech2Com
[email protected]
+49 163 2722363
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Australia
Sling & Stone
[email protected]
+61 412 520 349
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
India
Star Squared PR
[email protected]
+91 98451 76974

Media Kit

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.

Download All Assets

Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.