Feb 26, 2021
Verdict
Npower data breach: Credential stuffing attack forces app closure
Adam Palmer encourages the use of unique passwords for each account.
Tenable’s Steve Vintz explains reframing the role of the CFO to tackle cybersecurity challenges.
Read the Article | Watch VideoAmit Yoran joins CNBC Power Lunch to discuss Tenable's IPO.
Amit Yoran explains that cyber risk is business risk and that cyber exposure will arm the C-Suite.
Feb 26, 2021
Verdict
Adam Palmer encourages the use of unique passwords for each account.
Feb 26, 2021
Computing
Adam Palmer discusses the risks from credential stuffing attacks.
Feb 25, 2021
IoT Now
Satnam Narang looks back at the data breaches of 2020 to see what we can learn.
Feb 11, 2021
TickerTV Australia
Satnam Narang spoke to TickerTV Australia live on Tuesday about the key findings from the Tenable Threat Landscape report. He says “haste makes waste” hence why it’s important for cyber defenders to pause and reflect in order to better secure organisations in 2021.
Feb 11, 2021
Computer Weekly
Instead of paying ransoms, Adam Palmer argues for organizations to avoid becoming a victim in the first place.
Feb 10, 2021
The Daily Swig
Security experts, including Adam Palmer, react to EU's data breach notification guidelines.
Jan 15, 2021
ZDNet
Tenable Threat Landscape Retrospective Report reveals almost half of all data breaches in hospitals and the wider healthcare sector are as a result of ransomware attacks.
Jan 15, 2021
The Register
News coverage of Tenable's Threat Landscape Retrospective report, picking up on the top 5 vulnerabilities to address.
Dec 21, 2020
CNBC SquawkBox Europe
Amit Yoran explains that cyber risk is business risk and that cyber exposure will arm the C-Suite.
Dec 16, 2020
Women In Tech
Jennifer Cox shares her career path with Women In Tech.
Dec 14, 2020
Daily Telegraph
Satnam Narang's research into TikTok scams referenced in this news story on FinTok scams on the same platform.
Nov 18, 2020
The Daily Swig
Rody Quinlan explains that the vulnerabilities are relatively easy to exploit and present multiple attack vectors.
Nov 16, 2020
Forbes
Amit Yoran discusses the impending US Supreme Court case discussing the Computer Fraud and Abuse Act.
Nov 12, 2020
Finance Monthly
Co-authored byline from Adam Palmer discussing the benefits of CFOs and other executives involving cybersecurity in their roles.
Nov 11, 2020
The Register
Satnam Narang explains how CVE-2020-17087 was chained with CVE-2020-15999 to create an attack seen in the wild.
Nov 11, 2020
Computer Weekly
Satnam Narang explains how chaining vulnerabilities is important for threat actors. Bob Huber expressed concern with the lack of detail in the advisory.
Nov 10, 2020
IT Pro
Piece cites Satnam Narang's observations and Bob Huber's concern.
Nov 4, 2020
Computing
Satnam Narang warns users not to be duped by shortened URLs sent by scammers abusing flaw in the Google Drive notification system.
Nov 1, 2020
Digital Bulletin
Byline article from Adam Palmer discussing the relationship between DevOps and Security.
Oct 27, 2020
The Metro
Feature looking at Pornbots references Tenable's research into Instagram porn bot spam.
[email protected]
(443) 545-2102 ext. 1544
Mission North
[email protected]
(415) 503-1818
coRPkom
[email protected]
+52 55 5280-3977
GAD Comunicação
[email protected]
+55 11 99956-3188
Flame PR
[email protected]
+44 20 3357 9740
Tech2Com
[email protected]
+49 163 2722363
Finn Partners
[email protected]
+33 170 983 122
Star Squared PR
[email protected]
+91 98451 76974
Oak Consulting
[email protected]
+97 1 43 81 73 65
SIGNAL
[email protected]
Sling & Stone
[email protected]
+61 412 520 349
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Choose Your Subscription Option:
Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
$3,578
Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.
Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.
Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.
Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.
Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.