Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Kenna Prioritization to Prediction Volume 5

    Kenna Prioritization to Prediction Volume 5

    Read More
  • Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna

    Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna

    Read More
  • Prioritization to Prediction Vol 4

    Prioritization to Prediction Vol 4

    Produced in conjunction with the Cyentia Institute, this fourth volume of our Prioritization to Prediction series explores factors at play in successful vulnerability management.

    Read More
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • Risk Efficiency Calculator for Vulnerability Management

    Calculate Now
  • Risk, Measured: Epidemiology for Cybersecurity

    Risk, Measured: Epidemiology for Cybersecurity

    How does the spread, detection, and response to viruses like COVID-19 compare with cybersecurity practices today? In the second episode of our Risk, Measured series we talk to special guest,...

    Read Article
  • Vulnerability Management Maturity Part Two: Training Day

    Vulnerability Management Maturity Part Two: Training Day

    It’s safe to say that most modern enterprises live and breathe data. But not all data is created equal. Take, for example, the data used in early stage vulnerability management programs.  Go...

    Read Article
  • The State of Threat Intelligence with GreyNoise

    The State of Threat Intelligence with GreyNoise

    We chat about the state of everyone’s favorite buzz technology: Threat Intelligence with our favorite internet fingerprinter, Kenna’s head of research, Jcran. Joining us is a special guest,...

    Read Article
  • Vulnerability Management Maturity Part One: Growing Pains

    Vulnerability Management Maturity Part One: Growing Pains

    The coming-of-age story is a mainstay of the movies. We all love them, perhaps because they feel so familiar. A protagonist faces some sort of dilemma and gets knocked around a bit. There’s a bit...

    Read Article
  • DEF CON Was Actually Canceled (sort of)

    DEF CON Was Actually Canceled (sort of)

    We discuss the infamous cybersecurity gathering that gets canceled year-after-year, DEF CON. Guiding us along this journey to nowhere is everyone’s favorite security guru and serial DEF CON...

    Read Article
  • How does your vulnerability management compare to other companies?

    Take the Survey
  • Employee Spotlight: Leinenkugel with Larissa Torres

    Employee Spotlight: Leinenkugel with Larissa Torres

    It’s hard not to walk away from a conversation with Larissa Torres feeling inspired and motivated. I recently had a chance to chat with Larissa—a sales operations analyst—to learn about her...

    Read Article
  • Risk Efficiency: Kenna’s Standout ROI Metric

    Risk Efficiency: Kenna’s Standout ROI Metric

    Late last year I was given the task of developing a simple tool that would help quantify a customer’s return on investment (ROI) in Kenna solutions. Now, first let me clarify for you that we...

    Read Article
  • Patch Tuesday Rituals with JCran

    Patch Tuesday Rituals with JCran

    Both the bane and salvation of security teams, and the start of a month-long fix cycle for IT teams, Microsoft’s Patch Tuesday is a consistent reminder that nothing keeps us more secure than good...

    Read Article
  • DEF CON Is Canceled

    DEF CON Is Canceled

    I don’t know if you have heard, but DEF CON is canceled this year. No, seriously.  Yeah, I know DEF CON being canceled is a popular joke, but this year it is 100% for sure, really canceled! Please...

    Read Article
  • 5 Stars is Cool. Best Buy is Even Better. Here’s Why.

    5 Stars is Cool. Best Buy is Even Better. Here’s Why.

    When Jeff Heuer and I decided risk-based vulnerability management (RBVM) needed to be a thing a decade ago, we knew we were ushering in a more effective and efficient way for organizations to...

    Read Article
  • A Chronological Journey Through Risk-Based Vuln Management

    A Chronological Journey Through Risk-Based Vuln Management

    Picking up where we left off on the history of vulnerability management, Ed Bellis walks us through the history of risk-based vulnerability management (RBVM) to current times and the near future....

    Read Article
  • What is Modern Vulnerability Management?

    What is Modern Vulnerability Management?

    Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management. It leverages full visibility into a technology stack to target the...

    Read Article
  • Can Machine Learning Solve the Cybersecurity Skills Gap?

    Can Machine Learning Solve the Cybersecurity Skills Gap?

    Year after year we read about millions of unfilled cybersecurity jobs as incidents increase and Twitter experiences one of the most public cyber meltdowns in history. We talk with data scientist...

    Read Article
  • AppSec DataSheet

    AppSec DataSheet

    Read More
  • Considering Implementing Risk-Based Vulnerability Management? Start Here

    Considering Implementing Risk-Based Vulnerability Management? Start Here

    When TechValidate surveyed Kenna Security customers last year, one IT Security engineer observed that his organization’s Qualys vulnerability reports “were 12,000 pages long for 50 servers.”...

    Read Article
  • Analyzing Vulnerability Remediation Strategies with Cyentia Institute

    Analyzing Vulnerability Remediation Strategies with Cyentia Institute

    The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute – guests Ed Bellis and Wade Baker discuss P2P Volume 1 which...

    Read Article
  • What is Risk-Based Vulnerability Management?

    What is Risk-Based Vulnerability Management?

    Risk-based vulnerability management (RBVM) is a cybersecurity strategy in which organizations prioritize remediation of software vulnerabilities according to the risk they pose to the...

    Read Article
  • [Podcast] Intrigue In Discovery and Digital Fingerprinting

    [Podcast] Intrigue In Discovery and Digital Fingerprinting

    Want more detail than Shodan queries? Need to figure out which devices have that new critical vuln and are exposed to the internet? Creator of Intrigue.io, Jcran discusses his creation and touches...

    Read Article
  • Employee Spotlight: Lattes with Linda Brown

    Employee Spotlight: Lattes with Linda Brown

    If perseverance was a person, it would be Linda Brown. It’s been almost four and a half years since Linda joined Kenna Security as a customer success engineer. Since then, she has climbed through...

    Read Article
  • Asset Risk In 3 Short Videos (and 1 Long One)

    Asset Risk In 3 Short Videos (and 1 Long One)

    When you examine vulnerabilities and try to derive patterns and lessons learned, it becomes clear that risk management is not just about the vulns. It is, in fact, very much about the assets. In...

    Read Article
  • Risk Efficiency Calculator for Vulnerability Management

    Calculate Now
  • loading
    Loading More...