Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Media room

Tenable news, announcements and global media coverage

Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.

Get the latest Tenable news

From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.

Subscribe

Press releases

No results are matching your search criteria.

Lack of cyber funds in Biden infrastructure plan raises eyebrows

The Hill
Marty Edwards explains the importance of cybersecurity funding as part of President Biden's infrastructure plan.

University of Queensland uplifts its vulnerability management

iTNews
A look into how the University of Queensland is using Tenable.io to see, predict and act to reduce cyber risk across its domestic campuses.

Brisbane's Baidam Solutions deploys Tenable at University of Queensland

CRN Australia
A glimpse into how Tenable's partnerships with Baidam Solutions and the University of Queensland.

Cyberattack: 237 breaches hit healthcare sector in 2020

India TV News
A close look at breaches in the healthcare sector.

Risk-based vulnerability management scoring with Gary Jackson

The Security Collective
Gary Jackson delves into risk-based vulnerability scoring and how risk can be quantified.

Third-party attacks expose 12 million health care records

ITPro
Analysis of healthcare data breaches in 2020 from Tenable's Security Response Team.

Cybersecurity Is a C-Level Activity

Wired
In a blog on Wired's Innovation Insights, Ron Gula explains why cybersecurity must have a seat at the boardroom table.

Obama Calls For 30-Day Breach Notification Policy For Hacked Companies

Dark Reading
Ron Gula spoke with Kelly Jackson Higgins from Dark Reading about why CISPA is not a cure-all for preventing breaches.

FBI Warning Shows Targeted Attacks Don't Just Steal Anymore

Dark Reading
Ron Gula spoke with Dark Reading's Ericka Chickowski about the FBI warning against destructive malware that some believe could be tied to the recent attack on Sony Pictures Entertainment.

5 Ways PCI is Becoming More Security-Conscious Next Year

CSO
Jeff Man spoke with CSO's Maria Korolov about the release of PCI DSS 3.0 and the changes in the standard that will take effect in the next year.

Gavin Milllard Talks JPMorgan Breach in SC Magazine UK

SC Magazine UK
Doug Drinkwater quoted Gavin Millard in his article, "JPMorgan to double cyber security spending to £310 million after hack," where Millard discussed how the move impacts JPMorgan's security efforts moving forward.

Gavin Millard in Feedback Friday

SecurityWeek
Eduard Kovacs' "Feedback Friday" included comments from Gavin Millard on the recently disclosed JPMorgan Breach.

Why Gen Z traders are turning to TikTok for stock tips and money advice

Daily Telegraph
Satnam Narang's research into TikTok scams referenced in this news story on FinTok scams on the same platform.

Exploitation of Cisco Security Manager RCE flaws ‘imminent’

The Daily Swig
Rody Quinlan explains that the vulnerabilities are relatively easy to exploit and present multiple attack vectors.

The Future Of Cybersecurity Law Hinges On The Supreme Court

Forbes
Amit Yoran discusses the impending US Supreme Court case discussing the Computer Fraud and Abuse Act.

Successfully Connecting Cybersecurity To The Finance Function

Finance Monthly
Co-authored byline from Adam Palmer discussing the benefits of CFOs and other executives involving cybersecurity in their roles.

Microsoft emits 112 security hole fixes – including the cure for a Google-disclosed kernel vuln exploited in the wild

The Register
Satnam Narang explains how CVE-2020-17087 was chained with CVE-2020-15999 to create an attack seen in the wild.

Microsoft drops fix for serious zero-day among 112 Patch Tuesday updates

Computer Weekly
Satnam Narang explains how chaining vulnerabilities is important for threat actors. Bob Huber expressed concern with the lack of detail in the advisory.

Tenable wants to see the end of the 'nation-state attacked us' excuse

ZDNet Australia
Amit Yoran explains why the 'nation-state attacked us' excuse needs to stop in Australia.

Tenable wants to see the end of the 'nation-state attacked us' excuse

ZDNet
Amit Yoran offers his point of view on learned cyber helplessness.

Tom Parsons The Head Of Tenable In Ireland Appears On This Episode Of The Irish Tech News Podcast

Irish Tech News
Tom Parsons talks about the Tenable discovered Arlo vulnerability and much much more in this podcast.

NIS Directive: One Year On – Has it Been Enough?

Infosecurity Magazine
In this byline, Gavin Millard looks at what the NIS Directive has achieved one year on from its introduction in May 2018.

Crypto-mining malware leaps to Intel-powered Linux systems

SC Magazine
Gavin Millard explains how this coin-mining malware capitalizes on default credentials and user names with simple passwords to steal CPU cycles.

Unpatched vulnerabilities lurk in Comodo Antivirus

ZDNet
David Wells details his research of vulnerabilities in Comodo Antivirus.

Media contacts

Corporate Public Relations [email protected]
(443) 545-2102 ext. 1544
Brazil
Capital Informação
[email protected]
+ 55 11 3926.9517
France
PR Paradigm
[email protected]
+33 7 88 32 33 38
Middle East
Oak Consulting
[email protected]
+97 1 43 81 73 65
USA
Mission North
[email protected]
(415) 503-1818
UK
Flame PR
[email protected]
+44 20 3357 9740
Australia
Allison + Partners Australia
[email protected]
+61 408 441 662
India
Star Squared PR
[email protected]
+91 98451 76974
Mexico
Pedrote
[email protected]
+ 52 55 6578 3492
Germany
H zwo B Kommunikation
[email protected]
0049.9131.81281-25
Japan
Allison and Partner K.K
[email protected]
+81-3-6809-1300
Singapore
Eastwest PR
[email protected]
+65 96374747

Media kit

Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.


Download all assets