Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna

    Risk-Based Application Vulnerability Prioritization with Checkmarx and Kenna

    Read More
  • Prioritization to Prediction Vol 4

    Prioritization to Prediction Vol 4

    Produced in conjunction with the Cyentia Institute, this fourth volume of our Prioritization to Prediction series explores factors at play in successful vulnerability management.

    Read More
  • Why CIOs Should Focus On Vulnerability Management Right Now

    Why CIOs Should Focus On Vulnerability Management Right Now

    Few aspects of business look anything like they did even a week or two ago. Business travel is now virtually non-existent. Millions more employees are working from home, stressing corporate VPNs...

    Read Article
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • Kenna Shares: Some Pointers for the Work-From-Home Lifestyle

    Kenna Shares: Some Pointers for the Work-From-Home Lifestyle

    I’m sure all of your inboxes are overflowing with emails and articles on how to “effectively work from home” and memes about your 4-legged “co-workers”. I’m not going to pretend to have all the...

    Read Article
  • Employee Spotlight: Vodka Aperol with Vasili Panopoulos

    Employee Spotlight: Vodka Aperol with Vasili Panopoulos

    Thorough. Organized. Thoughtful. Supportive. Creative. Calm. Highly experienced. Inspirational. One of the best managers I have ever had the opportunity to work with.   When asked to describe...

    Read Article
  • Automated Vulnerability Management Response with Kenna and Demisto

    Automated Vulnerability Management Response with Kenna and Demisto

    Read More
  • Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion

    Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion

    In my conversations with our customers here at Kenna, I’ve noticed a shift over the last two years. It can come up in a variety of ways, perhaps they’re using a public cloud to deploy VM agents to...

    Read Article
  • An open letter from Karim Toubba, CEO of Kenna Security

    An open letter from Karim Toubba, CEO of Kenna Security

    We are in unprecedented times, and like all of you, Kenna Security is focused on providing our services to customers while ensuring the health and safety of our employees, families, and...

    Read Article
  • What Happens When you Eliminate The Friction Between IT and Security?

    What Happens When you Eliminate The Friction Between IT and Security?

    Every business in the world wants passionate people on their team. People who care. People that want to get the job done. But what happens when passionate people are faced with an insurmountable...

    Read Article
  • Are We Patching CVE-2020-0688 (the Microsoft Exchange RCE) Fast Enough?

    Are We Patching CVE-2020-0688 (the Microsoft Exchange RCE) Fast Enough?

    Last month, we analyzed progress versus the widely publicized ECC encryption vulnerability CVE-2020-0661 that was released in the January Microsoft Patch Tuesday announcement. Out of that...

    Read Article
  • [VIDEO] Why Kenna for Modern Vulnerability Management

    [VIDEO] Why Kenna for Modern Vulnerability Management

    Most security executives have the same concerns: the ever-increasing number of vulnerabilities and not enough resources to fix them all. The good news is, you don’t have to. Research shows that...

    Read Article
  • Kenna Security Named A Best Place to Work In Chicago

    Kenna Security Named A Best Place to Work In Chicago

    If you’ve ever read one of our press releases, you’ll notice there’s one thing we mention all the time: Kenna Security is a great place to work. We’ve won a bunch of awards for it, year after...

    Read Article
  • Employee Spotlight: Croissants with Colette Custin

    Employee Spotlight: Croissants with Colette Custin

    Since Colette Custin started her career at Kenna Security, every new employee has literally or virtually shaken her hand. As the leader of Kenna’s Corporate IT team, Colette’s responsibilities are...

    Read Article
  • RSA 2020 Recap: It’s Time to Say Goodbye to Traditional Vulnerability Management

    RSA 2020 Recap: It’s Time to Say Goodbye to Traditional Vulnerability Management

    Another RSA Conference is in the books!  The show never fails to serve as a fantastic opportunity to get some quality time with real-world security pros, including our customers and partners, and...

    Read Article
  • Examining Remediation Behavior for CVE-2020-0601

    Examining Remediation Behavior for CVE-2020-0601

    When Microsoft releases patches on Patch Tuesday, there’s commonly a lot of work for security teams to understand the impact of the new software patches, and ultimately, for high-risk...

    Read Article
  • 2 New Awards Recognize Kenna Security as the Pioneer in Risk-Based Vulnerability Management

    2 New Awards Recognize Kenna Security as the Pioneer in Risk-Based Vulnerability Management

    When you pioneer a completely new approach to vulnerability management, one that goes against the grain of established industry practices and traditional solutions, it’s not unreasonable to wonder...

    Read Article
  • Employee Spotlight: Tea with Tania Schneider

    Employee Spotlight: Tea with Tania Schneider

    When your company grows as quickly as ours has over the past few years, it’s invaluable to have someone on staff who is a wizard at organization, efficiency, problem solving, and brightening up...

    Read Article
  • Taking the Pulse on Vulnerability Management Ahead of RSA Conference 2020

    Taking the Pulse on Vulnerability Management Ahead of RSA Conference 2020

    Kenna Security was founded on a few basic propositions: Companies have more vulnerabilities than they can patch; but most vulnerabilities present very little risk. By harnessing data, we can help...

    Read Article
  • The Kenna Security Platform Data Sheet

    The Kenna Security Platform Data Sheet

    Read More
  • Get to Know Kenna Security at RSAC 2020

    Get to Know Kenna Security at RSAC 2020

    Are you feeling overwhelmed by vulnerabilities? Is your security in reactive mode?  Hopefully you aren’t, but in case you are (or you just want to take your vulnerability management program to the...

    Read Article
  • Employee Spotlight: Jet’s Pizza with Jerry Gamblin

    Employee Spotlight: Jet’s Pizza with Jerry Gamblin

    In an unlikely story of true love, a young Jerry Gamblin came to know the love of his life, his raison d’être, his ride-or-die—computers and “hacker-y stuff”—during the early 1990s. Decades later,...

    Read Article
  • Memo to CISOs: How to Make Vulnerability Management Matter to Your Board

    Memo to CISOs: How to Make Vulnerability Management Matter to Your Board

    It’s a rare board member who gets really excited about vulnerability management. The topic of assessing your host, network, and application vulnerabilities–and strategies to remediate them–is...

    Read Article
  • loading
    Loading More...