News

Tenable To Acquire Vulcan Cyber For $150M

  • February 12, 2025
  • 0 Comments

Tenable has signed a definitive agreement to acquire Vulcan Cyber, an innovator in exposure management. Vulcan Cyber’s capabilities will augment Tenable’s industry-leading Exposure Management platform, enhancing customers’ ability to consolidate exposures across their security stack, prioritize risks and streamline remediation efforts across the entire attack surface. Under the terms of the agreement, Tenable will acquire […]

News

Tenable Launches Data And AI Security Posture Management For Cloud Environments

  • October 30, 2024
  • 0 Comments

Tenable has announced new data security posture management (DSPM) and artificial intelligence security posture management (AI-SPM) capabilities for Tenable Cloud Security, the actionable cloud security solution. By extending exposure management capabilities to cloud data and AI resources, Tenable Cloud Security reduces risk to two of the biggest emerging threats. Today’s cloud environments are more complex than ever. […]

Cyber Security

Tenable Launches Tenable Enclave Security to Meet Demands of Highly Secure Environments

  • September 27, 2024
  • 0 Comments

Tenable has announced the availability of Tenable Enclave Security, a solution that supports the needs of customers operating in highly secure environments, such as those that are classified or otherwise air-gapped. Backed by Tenable Security Center, Tenable Enclave Security protects IT assets and modern workloads with risk assessment and contextual insight so organisations can identify exposures […]

News

Tenable Unveils Vulnerability Intelligence And Exposure Response

  • August 8, 2024
  • 0 Comments

Tenable has announced the release of Vulnerability Intelligence and Exposure Response, two powerful context-driven prioritization and response features available in Tenable Vulnerability Management, Tenable One and Tenable Cloud Security. The combined power of these features contextualises vulnerability data from internal and external sources, enabling organisations to close the exposures that pose the greatest risks to their […]

News

Tenable to Acquire Eureka Security

  • June 10, 2024
  • 0 Comments

Tenable has signed a definitive agreement to acquire Eureka Security, Inc., a provider of data security posture management (DSPM) for cloud environments. Eureka Security helps security teams gain a holistic view into an organization’s cloud data security footprint, fight policy drift and misconfigurations that put data at risk, and continuously improve their security posture over time. The acquisition is […]

News

Tenable Introduces Visibility Across IT, OT And IoT Domains

  • March 11, 2024
  • 0 Comments

Tenable has announced the release of Tenable One for OT/IoT. It is the first and only exposure management platform that provides holistic visibility into assets across IT and operational technology (OT) environments. The convergence of physical assets and IT – such as HVAC systems in data centres, badge readers in office buildings, cameras on manufacturing […]

News

Tenable Ranks #1 For Fifth Consecutive Year In Device Vulnerability Management Market Share

  • February 27, 2024
  • 0 Comments

Tenable has announced that it has been ranked first for 2022 worldwide market share for device vulnerability management in the IDC Worldwide Device Vulnerability Management Market Shares Exposures Present a Clear and Present Danger (doc #US50271923, December 2023) report. This is the fifth consecutive year Tenable has been ranked first, increasing its market share from 27.5% in 2021 […]

Cyber Security News

40% Of Cyberattacks Breach Saudi Arabian Organisations’ Defences: Tenable

  • December 13, 2023
  • 0 Comments

Tenable has highlighted that of the cyberattacks Saudi Arabian organisations experienced in the last two years, 40% were successful. This forces security teams to focus time and efforts on reactively mitigating cyberattacks, rather than preventing them in the first instance. With 68% of Saudi organisations confident that their cybersecurity practices are capable of successfully reducing […]