Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Kenna Security Platform Data Sheet

    Kenna Security Platform Data Sheet

    Read Flipbook
  • How to Measure, Report On, and Actually Reduce Vulnerability Risk

    How to Measure, Report On, and Actually Reduce Vulnerability Risk

    Read Flipbook
  • How to Implement a Risk-based Approach to Vulnerability Management

    How to Implement a Risk-based Approach to Vulnerability Management

    Read Flipbook
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk

    Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk

    Read Flipbook
  • Application Security Report

    Application Security Report

    Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.

    Read Flipbook
  • Caveat Emptor: Is It Really “Data Science”?

    Caveat Emptor: Is It Really “Data Science”?

    In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...

    Read Article
  • Align Around Risk

    Request a Demo
  • Prioritization to Prediction Report

    Prioritization to Prediction Report

    Analyzing Vulnerability Remediation Strategies

    Read Flipbook
  • Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...

    Read Article
  • [WEBINAR] How to Prioritize Application Vulnerabilities

    Watch Webinar
  • Close What Matters: 5 Requirements for Reducing Vulnerability Risk

    Close What Matters: 5 Requirements for Reducing Vulnerability Risk

    This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.

    Read Flipbook
  • Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

    Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

    Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...

    Read Article
  • Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management44:11

    Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management

    TransUnion CISO Jasper Ossentjuk believes that with the increased pace of automated and targeted attacks, InfoSec teams have to work smarter—not harder. That means the old methods of vulnerability ma

    Watch Video
  • Some Highlights From RSA 2018

    Some Highlights From RSA 2018

    This years’ RSA Conference was massive, gathering more than 40,000 attendees and over 500 vendors to showcase the latest tech, tools and tactics in the cyber security industry. Our latest...

    Read Article
  • Kenna Helped PTC Determine What to Fix First2:26

    Kenna Helped PTC Determine What to Fix First

    PTC’s security environment isn’t exactly simple. They have thousands of servers spread over multiple data centers. And their team was overwhelmed with security scan data. How did they make sense of

    Watch Video
  • Application Risk Management: Navigating the Storm

    Application Risk Management: Navigating the Storm

    Did you know that enterprises have anywhere from a few hundred to several thousand applications running on thousands of assets across their networks? Do the math on those numbers, and you’re...

    Read Article
  • Kenna Security’s CEO Discusses ‘Why Can’t Organizations Patch Their Networks?’ With Task Force 7 Radio

    Kenna Security’s CEO Discusses ‘Why Can’t Organizations Patch Their Networks?’ With Task Force 7 Radio

    Kenna Security’s CEO Karim Toubba was recently featured on Task Force 7 Cyber Security Radio, where he discussed risk management and remediation with host George Rettas. During the interview,...

    Read Article
  • How to Harness Supervised Machine Learning to Predict Exploitability

    How to Harness Supervised Machine Learning to Predict Exploitability

    Artificial intelligence and machine learning are dominating topics in the tech world. Every day our news feeds are flooded with promises of revolutionary applications of these systems, from smart...

    Read Article
  • loading
    Loading More...