Just 11% of remote employees restrict access to data and systems finds Tenable, Forrester Consulting
A recent study, commissioned by Tenable and conducted by Forrester Consulting, has highlighted the risks introduced from employees when working remotely. The data is drawn from ‘Beyond Bound... Read more
Tenable has been recognized as a leader by Frost & Sullivan in the firm’s Frost Radar: Global Vulnerability Management Market, 2021 report. The company, which ranked highest for consiste... Read more
Tenable has today warned users to be alert to fake cryptocurrency giveaways on social media, as fake Bitcoin, Ethereum, Dogecoin, Cardano, Ripple and Shiba Inu giveaways proliferate on YouTu... Read more
Tenable, announced it has been named Vendor of the Year by Ingram Micro. The annual Ingram Micro Vendor of the Year awards celebrates the success of more than two dozen emerging and establis... Read more
Tenable, the Cyber Exposure company, announced that it has appointed Brian Goldfarb as Chief Marketing Officer. Goldfarb will spearhead Tenable’s global marketing organization, positioning t... Read more
As Senior Manager of the Research Automation Infrastructure, Giuliana leads a team that works on collecting and modelling intelligence for a comprehensive directory of identified weaknesses... Read more
A vulnerability impacting Log4j versions 2.0 through 2.14.1 was disclosed on the project’s GitHub on December 9, 2021. The flaw has been dubbed Log4Shell and has the highest possible severit... Read more
Tenable, announced new features for Terrascan, the leading open source cloud native security analyzer that helps developers secure Infrastructure as Code. The new capabilities enable organiz... Read more
Tenable announced an expansion of its strategic relationship with IBM Security X-Force Red to deliver comprehensive Active Directory security services that continuously detect and prevent at... Read more
Tenable is focused on enabling our customers to see every asset and vulnerability across their entire modern attack surface, predict the vulnerabilities that will be leveraged in an attack o... Read more