Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Kenna Prioritization to Prediction Volume 5

    Kenna Prioritization to Prediction Volume 5

    Read More
  • Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna

    Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna

    Read More
  • Prioritization to Prediction Vol 4

    Prioritization to Prediction Vol 4

    Produced in conjunction with the Cyentia Institute, this fourth volume of our Prioritization to Prediction series explores factors at play in successful vulnerability management.

    Read More
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • Find Out How Your Vulnerability Management Ranks Against Your Peers

    Find Out How Your Vulnerability Management Ranks Against Your Peers

    Here at Kenna Security we hear it from our customers a lot. They want to know how their vulnerability management efforts compare to their peers. And it makes sense. Having a benchmark is a good...

    Read Article
  • The Cost Savings of Effective Vulnerability Management (Part 3)

    The Cost Savings of Effective Vulnerability Management (Part 3)

    In our last blog of this series, we looked at how reducing friction between IT and security can boost efficiency for an organization—a critical benefit for any organization that finds themselves...

    Read Article
  • Employee Spotlight: Apples with Anna Garcia

    Employee Spotlight: Apples with Anna Garcia

    If our customers succeed, we succeed. This mission can seem intimidating, but thankfully, Kenna Security has dedicated Customer Success Engineers like Anna Garcia working day-in and day-out to...

    Read Article
  • Adapting Customer Experience Teams In Changing Times.

    Adapting Customer Experience Teams In Changing Times.

    The coronavirus pandemic has upended nearly all aspects of business. The rapid (and sometimes unplanned) shift to work from home arrangements has, in turn, led to increased demand for support at...

    Read Article
  • Genpact CaseStudy

    Genpact CaseStudy

    Read More
  • The 6 Cybersecurity Questions Your CEO Wants Answered

    The 6 Cybersecurity Questions Your CEO Wants Answered

    What is a CISO’s top priority? A PWC and Harvard Business Review study asked executives what they thought it should be, both now and in three years.  According to survey participants, today’s...

    Read Article
  • The Cost Savings of Effective Vulnerability Management (Part 2)

    The Cost Savings of Effective Vulnerability Management (Part 2)

    The other week, we kicked off this blog series with the proposition that a risk-based vulnerability management approach is more cost-effective than a traditional “everything is at risk” model....

    Read Article
  • New Names. Same Awesome Security Technology.

    New Names. Same Awesome Security Technology.

    Last week, we shared some exciting news that included updates to our existing risk-based vulnerability management product, two new connectors, as well as a brand new product that will help...

    Read Article
  • Introducing SLAs for Vulnerability Management

    Introducing SLAs for Vulnerability Management

    Difficult tasks with arbitrary deadlines.  If you work in cybersecurity, difficult tasks are nothing new. But they’re made unpleasant, and even impossible when the deadlines to complete them are...

    Read Article
  • New Product Updates Enable Intuitive, Data-Driven Vulnerability Management

    New Product Updates Enable Intuitive, Data-Driven Vulnerability Management

    Even though we’re all remote these days, we can feel the excitement here at Kenna Security today as we unveil some exciting updates to our existing modern vulnerability management product,...

    Read Article
  • Kenna.VM Solution Brief

    Kenna.VM Solution Brief

    Read More
  • The Cost Savings of Effective Vulnerability Management (Part 1)

    The Cost Savings of Effective Vulnerability Management (Part 1)

    As our world grapples with a changing economy, most businesses are being asked to stretch budgets as far as they will go. “Do more with less” is hitting home now more than ever.  For those of us...

    Read Article
  • For CISOs Trying to Reduce Risk, New Research Reveals the Value of Focusing on Assets

    For CISOs Trying to Reduce Risk, New Research Reveals the Value of Focusing on Assets

    These days, it’s natural for executives charged with operating and protecting enterprise IT infrastructure to feel a little overwhelmed. Millions more employees are now working from home, testing...

    Read Article
  • Employee Spotlight: Coffee with Karim Toubba

    Employee Spotlight: Coffee with Karim Toubba

    My first week at Kenna Security in early December 2019 was predictably busy: new-hire paperwork, meeting new teammates, getting to know Kenna’s amazing technology, etc. But among invites to...

    Read Article
  • Why CIOs Should Focus On Vulnerability Management Right Now

    Why CIOs Should Focus On Vulnerability Management Right Now

    Few aspects of business look anything like they did even a week or two ago. Business travel is now virtually non-existent. Millions more employees are working from home, stressing corporate VPNs...

    Read Article
  • Kenna Shares: Some Pointers for the Work-From-Home Lifestyle

    Kenna Shares: Some Pointers for the Work-From-Home Lifestyle

    I’m sure all of your inboxes are overflowing with emails and articles on how to “effectively work from home” and memes about your 4-legged “co-workers”. I’m not going to pretend to have all the...

    Read Article
  • Employee Spotlight: Vodka Aperol with Vasili Panopoulos

    Employee Spotlight: Vodka Aperol with Vasili Panopoulos

    Thorough. Organized. Thoughtful. Supportive. Creative. Calm. Highly experienced. Inspirational. One of the best managers I have ever had the opportunity to work with.   When asked to describe...

    Read Article
  • Automated Vulnerability Management Response with Kenna and Demisto

    Automated Vulnerability Management Response with Kenna and Demisto

    Read More
  • Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion

    Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion

    In my conversations with our customers here at Kenna, I’ve noticed a shift over the last two years. It can come up in a variety of ways, perhaps they’re using a public cloud to deploy VM agents to...

    Read Article
  • An open letter from Karim Toubba, CEO of Kenna Security

    An open letter from Karim Toubba, CEO of Kenna Security

    We are in unprecedented times, and like all of you, Kenna Security is focused on providing our services to customers while ensuring the health and safety of our employees, families, and...

    Read Article
  • loading
    Loading More...