Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk

    Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk

    Read Flipbook
  • Application Security Report

    Application Security Report

    Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.

    Read Flipbook
  • Caveat Emptor: Is It Really “Data Science”?

    Caveat Emptor: Is It Really “Data Science”?

    In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...

    Read Article
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • Prioritization to Prediction Report

    Prioritization to Prediction Report

    Analyzing Vulnerability Remediation Strategies

    Read Flipbook
  • How to Implement a Risk-based Approach

    How to Implement a Risk-based Approach

    There’s a better way to manage vulnerabilities that can improve the organization’s security posture and give you (and upper-management) confidence in your efforts.

    Read Flipbook
  • Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...

    Read Article
  • Align Around Risk

    Request a Demo
  • Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

    Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

    Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...

    Read Article
  • Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management44:11

    Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management

    TransUnion CISO Jasper Ossentjuk believes that with the increased pace of automated and targeted attacks, InfoSec teams have to work smarter—not harder. That means the old methods of vulnerability ma

    Watch Video
  • [WEBINAR] How to Prioritize Application Vulnerabilities

    Watch Webinar
  • Some Highlights From RSA 2018

    Some Highlights From RSA 2018

    This years’ RSA Conference was massive, gathering more than 40,000 attendees and over 500 vendors to showcase the latest tech, tools and tactics in the cyber security industry. Our latest...

    Read Article
  • Kenna Helped PTC Determine What to Fix First2:26

    Kenna Helped PTC Determine What to Fix First

    PTC’s security environment isn’t exactly simple. They have thousands of servers spread over multiple data centers. And their team was overwhelmed with security scan data. How did they make sense of

    Watch Video
  • Application Risk Management: Navigating the Storm

    Application Risk Management: Navigating the Storm

    Did you know that enterprises have anywhere from a few hundred to several thousand applications running on thousands of assets across their networks? Do the math on those numbers, and you’re...

    Read Article
  • Kenna Security’s CEO Discusses ‘Why Can’t Organizations Patch Their Networks?’ With Task Force 7 Radio

    Kenna Security’s CEO Discusses ‘Why Can’t Organizations Patch Their Networks?’ With Task Force 7 Radio

    Kenna Security’s CEO Karim Toubba was recently featured on Task Force 7 Cyber Security Radio, where he discussed risk management and remediation with host George Rettas. During the interview,...

    Read Article
  • How to Harness Supervised Machine Learning to Predict Exploitability

    How to Harness Supervised Machine Learning to Predict Exploitability

    Artificial intelligence and machine learning are dominating topics in the tech world. Every day our news feeds are flooded with promises of revolutionary applications of these systems, from smart...

    Read Article
  • loading
    Loading More...