Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Prioritization to Prediction Vol 4

    Prioritization to Prediction Vol 4

    Produced in conjunction with the Cyentia Institute, this fourth volume of our Prioritization to Prediction series explores factors at play in successful vulnerability management.

    Read More
  • Employee Spotlight: Lemonade with Lindsey Compton

    Employee Spotlight: Lemonade with Lindsey Compton

    Conductor. Motivational speaker. Researcher. Problem solver. Budget whiz. Artist. Visionary. As a Product Manager at Kenna Security, Lindsey Compton wears any combination of different hats during...

    Read Article
  • CVE-2020-0601 FAQ

    CVE-2020-0601 FAQ

    UPDATE 2020-01-17: Updated to clarify that Windows 7 is NOT affected. Breaking Down MSFT’s CryptoAPI Vulnerability This week’s announcement of a major vulnerability in the Windows CryptoAPI...

    Read Article
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • Analysts Agree: The Future of Vulnerability Management Will Be Risk-Based

    Analysts Agree: The Future of Vulnerability Management Will Be Risk-Based

    There’s nothing quite like respected industry analysts signaling that you’re on the right track. What’s even better is when they signal the groundbreaking path you blazed in risk-based...

    Read Article
  • Employee Spotlight: Mezcal with Michael Roytman

    Employee Spotlight: Mezcal with Michael Roytman

    Legend has it that Kenna Security’s Chief Data Scientist, Michael Roytman, was concocted by combining four ounces of math, three-to-six cups of problem solving, and an unconfirmed measurement of...

    Read Article
  • 8 Cybersecurity Trends to Watch in 2020

    8 Cybersecurity Trends to Watch in 2020

    State-sponsored cyberattacks are on track to eclipse last year’s pace. Mirai-type threats are turning networked IoT devices running Linux into remotely controlled malware bots. Emotet and others...

    Read Article
  • Clocked: Customer Experience Survey Results Show Kenna Security Users Save Time, Improve Efficiency, and Collaborate Better

    Clocked: Customer Experience Survey Results Show Kenna Security Users Save Time, Improve Efficiency, and Collaborate Better

    Here at Kenna, we love customer feedback–in any form, at any time. It helps identify what we’re doing well and where we can improve. That’s important, because as the leader in risk-based...

    Read Article
  • Five Years In, RBVM Has Shifted Into Overdrive

    Five Years In, RBVM Has Shifted Into Overdrive

    Just about five years ago, I posted my first blog as this company’s freshly minted CEO. If you read it, you can sense I was excited about the team I came here to lead, and doubly so for the future...

    Read Article
  • [Video] Why Organizations Should Focus on Cyber Risk

    [Video] Why Organizations Should Focus on Cyber Risk

    When you can’t fix everything, how do you know what to work on first?  Kenna Security experts share how measuring and focusing on cyber risk helps organizations stay secure. Because when it comes...

    Read Article
  • Creating a Weather Forecast for Predicting Cybersecurity Vulnerabilities

    Creating a Weather Forecast for Predicting Cybersecurity Vulnerabilities

    When we read about major security breaches, we often are all too quick to point the blame at the company failing to patch a critical vulnerability. It’s easy to think that these breaches are...

    Read Article
  • 5 Halloween Costumes That Will Make Cybersecurity Geeks Go Insane

    5 Halloween Costumes That Will Make Cybersecurity Geeks Go Insane

    Halloween is about so much more than too much candy corn and not enough peanut butter cups. Halloween is about cybersecurity geeks dressing up in costumes that only other cybersecurity geeks will...

    Read Article
  • A Wave of Change for Vulnerability Risk Management

    A Wave of Change for Vulnerability Risk Management

    If you’re looking for evidence that the future of vulnerability management will be risk-based, look no further than The Forrester Wave™: Vulnerability Risk Management, Q4 2019. Forrester’s new...

    Read Article
  • 10 Questions I Hope No One Asks at Kenna Katalyst NYC

    10 Questions I Hope No One Asks at Kenna Katalyst NYC

    In a few days, this Chicago transplant is headed to New York for the first Kenna Katalyst Workshop on Oct. 29. I’m excited to participate in this first-of-its-kind tutorial, which will arm...

    Read Article
  • Welcome, Lumin!

    Welcome, Lumin!

    It’s a big day for risk-based vulnerability management! Tenable just delivered Lumin for their Tenable.io customers, the RBVM offering it announced 18 months ago. We want to welcome Tenable to the...

    Read Article
  • Poised for Growth: Kenna Security Announces Series D Funding

    Poised for Growth: Kenna Security Announces Series D Funding

    Right now is an exciting time for Kenna Security. We are in an unprecedented time of growth, change, and acceleration. As such, we just announced our newest round of funding—series D at $48...

    Read Article
  • Keeping Score on BlueKeep

    Keeping Score on BlueKeep

    Vulnerability management – the act of patching and mitigating avenues for security breaches in IT systems – overwhelms most organizations. Most security teams end each day with more...

    Read Article
  • Kenna Security and VMware Collaborate to Empower IT to Mitigate Vulnerability Risk

    Kenna Security and VMware Collaborate to Empower IT to Mitigate Vulnerability Risk

    Keeping the company secure has historically been the security organization’s job, but the reality of the threat landscape now and in the future requires other parts of the company to be involved....

    Read Article
  • Good, Better, Best: What Matters in Vulnerability Remediation

    Good, Better, Best: What Matters in Vulnerability Remediation

    Never cared for what they say Never cared for games they play Never cared for what they do… Forever trust in who you are And nothing else matters. — NOTHING ELSE MATTERS, METALLICA We are well...

    Read Article
  • A Vulnerability Score On Its Own Is Useless

    A Vulnerability Score On Its Own Is Useless

    An increasingly popular feature of modern vulnerability risk management platforms is to include a “score” for each vulnerability listed in the system. The purpose of the vulnerability score, of...

    Read Article
  • Not All Vulnerability Management Strategies Are Created Equal

    Not All Vulnerability Management Strategies Are Created Equal

    A quick visual comparison of four common vulnerability management strategies.

    Read Article
  • Must-Attend Talks At Black Hat & DEF CON

    Must-Attend Talks At Black Hat & DEF CON

    It’s almost time for security summer camp. To clarify, this isn’t your regular, bug spray and marshmallow laden summer camp, this is the yearly outing that is Black Hat USA 2019, DEF CON 27, and...

    Read Article
  • loading
    Loading More...