Media Room
Tenable News, Announcements and Global Media Coverage
Welcome to the Tenable media room. Read our latest announcements and media coverage, find global contact information and download our media kit below.
Get the latest Tenable News
From innovative product releases to industry research reports to strategic partnerships, get the latest Tenable news and official announcements delivered straight to your inbox.
Press Releases
Tenable Network Security Signs Exclusive Deal with Arrow Electronics in Australia and New Zealand
Tenable Network Security Helps Federal Systems Integrators Report on Federal Compliance and Protect Sensitive Data with New NIST Solution
With Cyber Attack Rates Persistent for Second Year, 88 Percent of UK Organisations Expect to be Targeted in Next 12 Months
Continuous PCI Compliance Monitoring from Tenable Network Security Provides Real-time Compliance Data on 75 Percent of PCI DSS Controls
Tenable Network Security Delivers Comprehensive Security Visibility to Google Cloud Platform Customers
Tenable Network Security Finds 89 Percent of UK Infosec Professionals Fail to Connect Cyber Success with Strategic Business Objectives
News
Tenable declares there are far worse security threats to fear than zero-day exploits
- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
#EdgeLondon2019: Focus on System and User Hygiene, Not Zero-Days
- Business
- Corporate News
- Cybersecurity
- Vulnerability Management
Professional cyber criminals command $75k per annum
- Business
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
First BlueKeep hacking campaign discovered after months of caution
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Overcoming the container security conundrum: What enterprises need to know
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
MikroTik router compromise exploit detailed
- Business
- Cyber Breaches
- Cybersecurity
- Vulnerability Management
Crypto-mining malware leaps to Intel-powered Linux systems
SC Magazine •- Cyber Breaches
- Cybersecurity
- Vulnerability Management
The seedy underbelly of social media platform popular with teens
Yahoo! News Australia •- Cybersecurity
- Surveys / Research Data
TikTok is filled with adult-dating scams and fake accounts, report says
CNET •- Cybersecurity
- Surveys / Research Data
Election Security At Def Con
NPR •- Cybersecurity
- Government
Instagram 'porn bots' are using literary quotes to peddle adult dating spam
The Mirror •- Business
- Corporate News
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
Unpatched vulnerabilities lurk in Comodo Antivirus
ZDNet •- Business
- Cyber Breaches
- Cybersecurity
- Surveys / Research Data
- Vulnerability Management
Understanding, Preparing for Healthcare Ransomware Attacks
HealthITSecurity •- Cyber Breaches
- Healthcare
- Vulnerability Management
The Importance of Cyber Hygiene
Manufacturer's Monthly •- Vulnerability Management
Few Adopt NIST Cybersecurity Guidlines, but That Could Change
Third Certainty •- Cyber Policy
- Surveys / Research Data
- Vulnerability Management
MedStar Hack Shows Risks that Come with Electronic Health Records
The Baltimore Sun •- Cyber Breaches
- Healthcare
- Vulnerability Management
Top Takeaways from the DROWN Vulnerability
TechBeacon •- Vulnerability Management
InfoSec Practitioners Ranked Global Cybersecurity Readiness a ‘C’ Average
ComputerWorld Singapore •- Cybersecurity
- Surveys / Research Data
- Vulnerability Management