Media Room
Tenable News, Announcements and Global Media Coverage
Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.
Get the latest Tenable News
From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.
Press Releases
News
What Will The NIS2 Directive Mean For Smaller Organisations?
In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention
In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.
- Cyber Breaches
- Cybersecurity
- Products
- Vulnerability Management
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Scammers Litter Dating Apps With AI-Generated Profile Pics
Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."
- Business
- Cybersecurity
Microsoft says US rivals are beginning to use generative AI in offensive cyber operations
Microsoft and OpenAI said that U.S. adversaries — chiefly Iran and North Korea, and to a lesser extent Russia and China — are beginning to use their generative AI models to mount or organize offensive cyber operations. Amit Yoran, CEO of Tenable, tells AP, “Of course bad actors are using large-language models — that decision was made when Pandora’s Box was opened."
- Cybersecurity
US says it disrupted a China cyber threat, but warns hackers could still wreak havoc for Americans
FBI Director Chris Wray warned that China is positioning itself to disrupt the daily lives of Americans if the United States and China ever go to war. Amit Yoran, CEO of Tenable, called Wray’s warning “an urgent call to action. Continuing to turn a blind eye to the risk sitting inside our critical infrastructure is the definition of negligence.”
- Cybersecurity
- Government
Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately
IT Pro •Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.
- Business
- Cybersecurity
- Vulnerability Management
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
Citrix Warns NetScaler ADC Customers of New Zero-Day Exploitation
Security Week •A security bulletin published by Citrix on Tuesday informs customers that two new zero-day vulnerabilities affecting its NetScaler ADC and Gateway products have been exploited in attacks. “The impact from these two new zero-day vulnerabilities is not expected to be as significant as CitrixBleed,” Tenable experts said.
- Business
- Cybersecurity
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Satnam Narang provides insights into old and new threats within the metaverse
Ticker Insight •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Tenable One offers MSSPs unified cyber exposure visibility, Tenable says
IT Europa •- Business
- Corporate News
- Cybersecurity
Satnam Narang breaks down how Pig Butchering scams work
Ticker Insight •- Business
- Corporate News
- Cybersecurity
Vallourec better secures Microsoft's Active Directory with Tenable
Solutions Numeriques •- Business
- Corporate News
- Cybersecurity
"Tenable One is the first brick of a greater whole"
Journal Du Net •- Business
- Corporate News
- Cybersecurity
Nationale Cybersicherheitsstrategie erfordert Cyberhygiene
ZDNet •- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Glen Pendley on transparency from cloud infrastructure providers
TickerTV •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Marty Edwards discusses how operational environments have changed
Ticker News •- Business
- Corporate News
- Cyber Policy
- Cybersecurity
FTC: Companies Could Face Legal Action for Failing to Patch Log4j
Dark Reading •- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Tenable commends Australia's Ransomware Action Plan
TickerTV Australia •- Business
- Corporate News
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
- Vulnerability Management
Software Industry Awaits Details on Biden’s Order to Report Hacks
The Wall Street Journal •- Cyber Policy
- Government
What Will The NIS2 Directive Mean For Smaller Organisations?
Cyber Security Intelligence •In this opinion piece, published by Cyber Security Intelligence, Bernard Montel looks at the expanded scope of NIS2 as the countdown begins to the October deadline
- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Bernard Montel, Tenable: Faced with the increasing sophistication of cyber threats, solutions must enable companies to move to a strategy focused on prevention
Global Security Mag •In an interview with Global Security Magazine Bernard Montel discusses the value Tenable One affords organisations and the virtue of a preventative versus reactive security posture.
- Cyber Breaches
- Cybersecurity
- Products
- Vulnerability Management
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
Techopedia •In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Scammers Litter Dating Apps With AI-Generated Profile Pics
Bloomberg •Watch out for pig butchering scams – a type of financial fraud that has enabled scammers to steal hundreds of millions of dollars from victims. Senior staff research engineer Satnam Narang published new firsthand research this week detailing pig butchering methods and techniques. Satnam spoke to Bloomberg exclusively about the strategies and tactics of the lucrative scam. He said, "I can say with high confidence these scams were associated with losses totaling nearly $13 million dollars."
- Business
- Cybersecurity
Microsoft says US rivals are beginning to use generative AI in offensive cyber operations
Associated Press •Microsoft and OpenAI said that U.S. adversaries — chiefly Iran and North Korea, and to a lesser extent Russia and China — are beginning to use their generative AI models to mount or organize offensive cyber operations. Amit Yoran, CEO of Tenable, tells AP, “Of course bad actors are using large-language models — that decision was made when Pandora’s Box was opened."
- Cybersecurity
US says it disrupted a China cyber threat, but warns hackers could still wreak havoc for Americans
Associated Press •FBI Director Chris Wray warned that China is positioning itself to disrupt the daily lives of Americans if the United States and China ever go to war. Amit Yoran, CEO of Tenable, called Wray’s warning “an urgent call to action. Continuing to turn a blind eye to the risk sitting inside our critical infrastructure is the definition of negligence.”
- Cybersecurity
- Government
Satnam Narang provides insights into old and new threats within the metaverse
Ticker Insight •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Satnam Narang talks about the ransomware boom
TickerTV •- Business
- Corporate News
- Cybersecurity
- Surveys / Research Data
Satnam Narang on metaverse threats
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Satnam Narang discusses 2021 Threat Landscape Retrospective
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Healthcare
- Surveys / Research Data
- Vulnerability Management
Cybercriminals gave government departments a run for their money in 2021
The Mandarin •- Corporate News
- Cyber Breaches
- Cybersecurity
- Government
- Surveys / Research Data
- Vulnerability Management
Scammer use YouTube Shorts for posting stolen videos from TikTok: Report
The Economic Times of India •- Corporate News
- Cybersecurity
- Surveys / Research Data
How Misconfigurations Threaten Your Cloud Security: The Big Interview with Bernard Montel, EMEA Technical Director, Tenable
Techopedia •In an interview with Techopedia, EMEA technical director and security strategist, Bernard Montel, talked about the misconfigurations that can threaten cloud security and why companies need to shift from reactive threat detection to proactive cloud security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Exclusive Feature: Data Privacy
Tahawultech News •Bernard Montel, EMEA Technical Director and Security Strategist, used Data Privacy Day to remind everyone that you can't have privacy without security.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Citrix confirms two new NetScaler vulnerabilities as firms urged to patch immediately
IT Pro •Senior Staff Research Engineer, Satnam Narang, responded to news that Citrix has issued patches for two new vulnerabilities in its NetScaler ADC and Gateway appliances.
- Business
- Cybersecurity
- Vulnerability Management
The Innovator – Gavin Millard
Security Buyer •Deputy CTO Gavin Millard was interviewed by Security Buyer to discuss, what he has dubbed, the 'Jay-Z rule - you've got 99 flaws, but all they need is one.
- Business
- Cybersecurity
- Vulnerability Management
We shall not be moved!
Computing Security •In an interview with Computing Security, Satnam Narang, Senior Staff Research Engineer, discussed how LockBit is breaching some of the world's largest organisations.
- Business
- Cybersecurity
- Vulnerability Management
Cyberattacks breaching defences on massive scale
Computing Security •In this opinion piece, Bernard Montel, EMEA Technical Director and Security Strategist uses data from a recent Tenable study to illustrate the challenge facing organisations.
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management