Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Ricerca Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.

Get the latest Tenable news

From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.

Iscriviti

Comunicati stampa

No results are matching your search criteria.

Editor’s Question: What security risks are being introduced as IT and OT networks converge?

Intelligent CIO
Answering this month's question, Maher Jadallah explains that the convergence of IT and OT has expanded the attack surface.

Do we need tougher breach notification rules?

Computing
Jamie Brown discusses UK breach notification laws.

Microsoft Sounds Windows 10 ‘Exploitation More Likely’ Alarm: Here’s Exactly What That Means

Forbes
Rody Quinlan explains why CVSS will catch the attention of threat actors, but alone it is not always enough to prompt active exploitation.

Critical SharePoint and browser security flaws star in May Patch Tuesday

The Daily Swig
Satnam Narang draws attention to the volume of patches issued by Microsoft in the last three months.

Nation state APT groups prefer old, unpatched vulnerabilities

Computer Weekly
Satnam Narang expresses his lack of surprise at the popularity of old Microsoft vulnerabilities given cyber criminals prefer low hanging fruit.

Salt framework security flaws used to attack multiple targets

Daily Swig
Rody Quinlan takes a closer look at the combination of Salt flaws, and speed of exploitation.

Cloud tops the menu in 2020, with helpings of HCI, security and 5G

Microscope
David Cummins shares his 2020 prediction of security technologies designed specifically for Cloud environments to make migration secure.

Telnet credentials of 515,000 routers, servers & IoT devices dumped on hacker forum

TEISS
Irrelevant of the protocol used, Gavin Millard tells TEISS that the number of systems connected to the internet with easily guessed passwords is a concern.

Telnet credentials for half-a-million IoT devices and routers released online

Computing
Gavin Millard tells Computing Telnet belongs in the museum of hilariously bad security issues alongside its cleartext twin FTP.

WEF Fears Cyber-Threats and Digital Fragmentation

Infosecurity Magazine
Renaud Deraison told Infosecurity Magazine that it’s not just about stopping bad actors from damaging mission-critical services, but preventing them getting a foothold to cause harm.

Global Risks Report: Junk Products Raising Risk of Infrastructure Attacks

Computer Business Review
Renaud Deraison told Computer Business Review that this year’s WEF Global Risks Perception Survey (GRPS) "resonates with my own concerns that a serious cyberattack against critical infrastructure is imminent."

Microsoft Windows 10 hit by ‘severe’ vulnerability that could affect up to one billion users

The Metro
Amit Yoran said it is ‘exceptionally rare if not unprecedented’ for the U.S. government to share its discovery of such a vulnerability with a company.

The Long Tail of the Intel AMT Flaw

Dark Reading
Cris Thomas tells Dark Reading what the Intel AMT flaw means for security teams.

The hijacking flaw that lurked in Intel chips is worse than anyone thought

ArsTechnica
ArsTechnica's Dan Goodin looks at how Tenable researchers discovered a flaw in Intel AMT that bypasses authentication.

Researchers disclose Intel AMT flaw research

Threatpost
Anthony Bettini talks with Threatpost about how the Tenable research team was the first to deliver a check for the Intel AMT flaw to customers.

Periodic vulnerability assessment is a recipe for disaster

CSO
In CSO, Dick Bussiere explains why current trends like DevOps, containers, IoT and mobile security have made vulnerability assessment mandatory for CISOs.

How to find cybersecurity vulnerabilities across your environment

Forbes
Amit Yoran continues the conversation on creating an integrated security ecosystem and the important role of vulnerability management with Dan Woods of Forbes.

The Security Challenges of Enterprise Container Adoption

Infosecurity Magazine
In Infosecurity Magazine, Tony Bettini discusses the rapid adoption of containers, and the security risks that many organizations are overlooking.

Media contacts

Corporate Public Relations [email protected]
(443) 545-2102 ext. 1544
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Mission North
[email protected]
(415) 503-1818
UK
Flame PR
[email protected]
+44 20 3357 9740
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Media Kit

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets