Media room
Tenable news, announcements and global media coverage
Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.
Get the latest Tenable news
From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.
Press releases
SecOps Teams Need to Tackle AI Hallucinations to Improve Accuracy
AI hallucinations are inevitable right now, especially with an influx of AI-powered tools hitting the market. However, there are ways security teams can mitigate or adjust to the risk. Implementing a similar structure to how code is reviewed is one method, Tenable CSO Bob Huber recommends.
- Business
- Cybersecurity
Tenable Bolsters AI Controls With Apex Security Acquisition
Tenable announces its intent to purchase Apex Security, a pioneer in securing the rapidly expanding AI attack surface. Apex Security will bring deep visibility into user behavior and help address accidental and malicious misuse of AI. Tenable CPO Eric Doerr said clients demand tools that detect AI usage and also implement enforceable guardrails and help mitigate risk.
- Business
- Corporate News
- Cybersecurity
A Cybersecurity Paradox: Even Resilient Organizations Are Blind to AI Threats
What qualities do cyber-resilient organizations possess? Tenable CSO Bob Huber tells Dark Reading, "Leaders at resilient organizations understand that cybersecurity risk is business risk. They are able to adapt quickly to ensure continued operations and work with partners to surge resources as required. Above all, cyber-resilient organizations have leaders who are able to manage stress effectively while providing their teams the necessary resources and autonomy to execute effectively."
- Business
- Cybersecurity
Last-Minute Funding Uncertainty for Key Cyber Program Spooks Industry
The near-closure of the Common Vulnerabilities and Exposures (CVE) program sparked concerns from the cybersecurity industry about its operation. Tenable CSO Bob Huber tells The Wall Street Journal that a public-private partnership is likely needed to spread responsibility, enhance the program and benefit the security industry, as well as national security.
- Business
- Cybersecurity
If You Deleted This Weird New Folder in Windows, You Need to Put It Back. Here's How
Senior staff research engineer Satnam Narang shares insights on the curiously empty folder, labeled "inetpub," Microsoft added in the latest Windows 11 update.
- Cybersecurity
Why firms need ‘exposure management’ to reduce cyber risk for cloud and AI
Interview with Liat Hayun discussing how cloud apps and AI tools create potentially harmful gaps in a company’s security infrastructure.
- Business
- Cybersecurity
- Vulnerability Management
Ivanti confirms the exploitation of two new vulnerabilities
Le Mag IT •Satnam Narang, Senior Staff Research Engineer, offered an analysis of new Ivanti flaws highlighting the risk given that the anticipated wait time for a patch is several weeks.
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Prevention is better than cure when it comes to cybersecurity
Just Auto •In this opinion piece, EMEA Technical Director and Security Strategist Bernard Montel discusses the dramatic evolution of the automotive industry and the cyber risks that creates.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Ep 182: AI Efficiencies in Cyber – A Double-Edged Sword
Everyday AI •CTO Glen Pendley was interviewed on the Everyday AI podcast this week, talking about generative AI use cases for cyber defenders, highlighting Tenable ExposureAI, which helps customers search faster, analyze faster and make decisions faster.
- Business
- Cybersecurity
Patch Tuesday December 2023
IT Pro •Satnam Narang, Senior Staff Research Engineer offers his analysis of January's Patch Tuesday.
- Business
- Cybersecurity
- Vulnerability Management
Tenable study reveals 40% of cyberattacks breach Saudi Arabian organisations’ defences
Tahawultech News •A Tenable study found that respondents were particularly concerned with the risks associated with cloud infrastructure.
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Tenable CEO Amit Yoran on rising cyber threats and state of data security
CNBC Worldwide Exchange •Amit Yoran, CEO of Tenable, discusses the cybersecurity landscape following a recent string of cyberattacks.
- Business
- Cybersecurity
Satnam Narang on metaverse threats
TickerTV •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Marty Edwards reflects on the one year anniversary of the Colonial Pipeline attack
KBKast •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
A year after the Colonial Pipeline attack – have we learnt anything?
Times of India •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
One year on from the attack on Colonial Pipeline - have we learnt anything?
Ticker Insight •- Corporate News
- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
Marty Edwards discusses how operational environments have changed
Ticker News •- Business
- Corporate News
- Cyber Policy
- Cybersecurity
Beware of the Tinder swindler: How romance scams hit record high of $1.3 billion in 2021
Times of India •- Corporate News
- Cybersecurity
We Must Develop Guidance and Best Practices for Securing Critical Infrastructure
Morning Consult •- Cyber Policy
- Cybersecurity
- Energy
- Government
Australia's Assistance And Access Bill Increases Risks Of Cyber Attacks
Forbes •- Business
- Cyber Breaches
- Cyber Policy
- Cybersecurity
- Government
Looming Cybersecurity Battle: Who Protects U.S. Pipelines?
Bloomberg BNA •- Cyber Policy
- Cybersecurity
- Energy
RSA: Major tech companies band together to fight cyber-attacks
SC Magazine UK •- Corporate News
- Cyber Policy
Facebook, Microsoft, and 32 other tech firms sign cybersecurity pledge
Venture Beat •- Corporate News
- Cyber Policy
Parsing the Russian sanctions, hacking accusations
Politico •- Cyber Breaches
- Cyber Policy
- Cybersecurity
Tenable Co-CEO Steve Vintz highlights growth of exposure management market, Vulcan Cyber acquisition
CNBC Worldwide Exchange •Steve Vintz, Tenable Co-CEO and CFO, was interviewed on CNBC Worldwide Exchange about Tenable’s most recent earnings results, his outlook for cyber spending in 2025 and how the acquisition of Vulcan Cyber will accelerate Tenable’s dominance in the growing exposure management market. Vintz also comments on how public sector spending may be impacted by DOGE and potential trade wars.
- Business
- Cybersecurity
Most online Exchange Servers vulnerable to ProxyLogon still not remediated
SC Media •Ninety-one percent of almost 30,000 internet-exposed Microsoft Exchange Server instances impacted by the ProxyLogon flaw leveraged by Chinese state-backed threat operation Salt Typhoon continue to be vulnerable to attacks involving the bug, tracked as CVE-2021-26855, nearly four years after it was patched according to Tenable Research.
- Business
- Cybersecurity
Zero-day vulnerability in SonicWall SMA series under attack
TechTarget •SonicWall released a hotfix for a critical pre-authentication remote code execution vulnerability in Secure Mobile Access 1000 products amidst reports of zero-day exploitation.
While information is currently limited, Scott Caveza, staff research engineer at Tenable, told Informa TechTarget that SonicWall's security advisory implies that the vulnerability was potentially exploited in the wild. Tenable cannot confirm the activity, but it is monitoring the situation for further developments, he added.
"Microsoft's Threat Intelligence Center reported the issue to SonicWall, which suggests there have been observations of exploitation," Caveza said in an email. "Despite the uncertainty around exploitation, threat actors have targeted SonicWall devices in the past and several SonicWall vulnerabilities have been featured on the Known Exploited Vulnerabilities (KEV) catalog from the U.S. Cybersecurity & Infrastructure Security Agency (CISA). Patching of impacted SonicWall devices should take priority to ensure this threat is mitigated as soon as possible."
- Cyber Breaches
- Cybersecurity
The 20 Coolest Cloud Security Companies Of The 2025 Cloud 100
CRN •Tenable Once Again Named One of the Top 20 Cloud Security Companies by CRN
- Cybersecurity
China's cyber intrusions took a sinister turn in 2024
The Register •"What's unique about Volt Typhoon is the post-exploitation activity," Tenable research engineer Scott Caveza told The Register. It doesn't use custom malware, which can be more easily spotted by antivirus software, but instead uses legitimate software products and credentials to snoop around and avoid detection.
- Cyber Breaches
- Cybersecurity
Apple warns 2 macOS zero-day vulnerabilities under attack
TechTarget •The macOS Sequoia vulnerabilities are the latest to be targeted and exploited by threat actors as cybersecurity vendors report a shift in the landscape.
Satnam Narang, senior staff research engineer at Tenable, told TechTarget Editorial that Apple is known for providing limited technical details in their advisories. However, he highlighted one aspect of Apple's advisory.
"The one interesting aspect about these two zero days is that the advisories called out exploitation specifically for Intel-based Mac systems, which are now considered legacy products for Apple. Apple switched over to their own Apple silicon in late 2020," Narang said. "Typically, zero-day exploitation of vulnerabilities is part of limited, targeted attacks. When you add that these were attributed to researchers at Google's Threat Analysis Group, which are often tasked with investigating targeted attacks, it supports that hypothesis. Until Googles Threat Analysis Group publishes their own research into the attacks, we won’t know more than what's in the advisories."
- Cyber Breaches
- Cybersecurity
Satnam Narang discusses key findings from Tenable Threat Landscape Retrospective report
TickerTV Australia •- Business
- Cyber Breaches
- Surveys / Research Data
Ransomware attacks now to blame for half of healthcare data breaches
ZDNet •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Coming in at number 5, it's a blast from the past! Tenable's 2020 security flaw chart show features hits of yesteryear
The Register •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Why Gen Z traders are turning to TikTok for stock tips and money advice
Daily Telegraph •- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Pornbots are taking over Instagram – but how do they work?
The Metro •- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
When Your Last $166 Vanishes: ‘Fast Fraud’ Surges on Payment Apps
The New York Times •- Cybersecurity
- Surveys / Research Data
AI could revolutionize the IT department but companies need to consider data risks, says expert
IT Pro •Speaking with IT Pro deputy CTO Gavin Millard urged businesses to draw up plans for AI adoption to avoid playing catch-up down the line.
- Cyber Policy
- Cybersecurity
- Vulnerability Management
Le Grand Témoin : Amit Yoran Tenable
Informatique News •- Cyber Breaches
- Cyber Exposure Live
- Cybersecurity
- Vulnerability Management
Microsoft November 2022 Patch Tuesday addresses six exploited zero-days
Computing •- Cybersecurity
- Vulnerability Management
Microsoft serves smorgasbord of six zero-days
Computer Weekly •- Business
- Cybersecurity
- Vulnerability Management
Cyber threats to Europe’s grid: Utilities rethink strategy
Computer Weekly •- Cyber Breaches
- Cybersecurity
- Energy
- Vulnerability Management
Connected EVs are prime targets for a new era of cyber attacks, opinion
Automotive Management •- Cyber Breaches
- Vulnerability Management
Media contacts
Media kit
Download the Tenable media kit, complete with company and product logos and usage guidelines, executive headshots and the corporate fact sheet.