Latest Content

Welcome to our Hub! We hope you find something interesting to read, watch and share.

  • Prioritization to Prediction Vol 4

    Prioritization to Prediction Vol 4

    Produced in conjunction with the Cyentia Institute, this fourth volume of our Prioritization to Prediction series explores factors at play in successful vulnerability management.

    Read More
  • Kenna Security and VMware Collaborate to Empower IT to Mitigate Vulnerability Risk

    Kenna Security and VMware Collaborate to Empower IT to Mitigate Vulnerability Risk

    Keeping the company secure has historically been the security organization’s job, but the reality of the threat landscape now and in the future requires other parts of the company to be involved....

    Read Article
  • Good, Better, Best: What Matters in Vulnerability Remediation

    Good, Better, Best: What Matters in Vulnerability Remediation

    Never cared for what they say Never cared for games they play Never cared for what they do… Forever trust in who you are And nothing else matters. — NOTHING ELSE MATTERS, METALLICA We are well...

    Read Article
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • A Vulnerability Score On Its Own Is Useless

    A Vulnerability Score On Its Own Is Useless

    An increasingly popular feature of modern vulnerability risk management platforms is to include a “score” for each vulnerability listed in the system. The purpose of the vulnerability score, of...

    Read Article
  • Not All Vulnerability Management Strategies Are Created Equal

    Not All Vulnerability Management Strategies Are Created Equal

    A quick visual comparison of four common vulnerability management strategies.

    Read Article
  • Must-Attend Talks At Black Hat & DEF CON

    Must-Attend Talks At Black Hat & DEF CON

    It’s almost time for security summer camp. To clarify, this isn’t your regular, bug spray and marshmallow laden summer camp, this is the yearly outing that is Black Hat USA 2019, DEF CON 27, and...

    Read Article
  • Staying Secure and Productive at Black Hat and DEF CON

    Staying Secure and Productive at Black Hat and DEF CON

    Are you going to Black Hat and DEF CON (colloquially known as security summer camp) and are tired of the “leave anything that plugs in at home if you don’t want to be pWn3d at one of the largest...

    Read Article
  • [Video] Turning Data Science Into Security Decisions

    [Video] Turning Data Science Into Security Decisions

    What do I work on today? In security that’s the only question that matters.  Find out from the source, the Kenna employees who work on it, how Kenna’s data science algorithms ingest, aggregate,...

    Read Article
  • Go Beyond Application Vulnerability Correlation White Paper

    Go Beyond Application Vulnerability Correlation White Paper

    Read More
  • One-fifth of the most-used Docker containers have at least one critical vulnerability

    One-fifth of the most-used Docker containers have at least one critical vulnerability

    When CVE-2019-5021 was released on May 8, it made me wonder how widespread the issue of vulnerabilities in popular containers is. Businesses have increasingly come to rely on containers as an...

    Read Article
  • Make Your Vulnerability Management Efforts Count

    Make Your Vulnerability Management Efforts Count

    Enterprises of all sizes are inundated with more vulnerabilities than their teams can ever hope to remediate, so they need a way to prioritize which to fix first. Unfortunately, most use the...

    Read Article
  • The Summer Reading List

    The Summer Reading List

    You love reading, we love reading. That’s why this summer Kenna Security is sharing with you a list of titles our research team have read, are reading, or look forward to reading this summer. The...

    Read Article
  • [Video] Using Data Science to Simplify Cybersecurity

    Security is at the forefront of everybody’s mind. You walk through the airport, you see cybersecurity. You install apps on your phone because you’re not secure. It’s sort of in everyone’s face....

    Read Article
  • ESG Lab Review – The Kenna Security Platform

    ESG Lab Review – The Kenna Security Platform

    IT analyst firm ESG recently conducted hands-on testing and review how the Kenna Security Platform enables organizations to work cross-functionally to prioritize and mitigate cyber risk.

    Read More
  • ESG Solution Showcase – Unified Risk Management Platform

    ESG Solution Showcase – Unified Risk Management Platform

    Why is risk management so difficult? Because enterprise organizations have thousands of assets and potentially millions of vulnerabilities at any one time.

    Read More
  • The New Application Attack Surface

    The New Application Attack Surface

    This post comes as a result of a conversation between Tyler Shields, VP Strategy of Sonatype and myself.   The way we create, deploy and operate applications has changed in the last few years....

    Read Article
  • Nearly 20% of the 1000 Most Popular Docker Containers Have No Root Password

    Nearly 20% of the 1000 Most Popular Docker Containers Have No Root Password

    Earlier this month, Talos released research showing that the Alpine Linux docker images were shipping with no (or nulled) root passwords. Alpine patched the docker files, and issued their response...

    Read Article
  • Predicting CVE-2019-0708

    Predicting CVE-2019-0708

    UPDATE 20190723: A working exploit is now available in Immunity Canvas. UPDATE 20190719: A technical document from Keenlab was posted detailing how to exploit the vulnerability. UPDATE 20190604:...

    Read Article
  • Gaining Visibility in an AppSec World

    Gaining Visibility in an AppSec World

    It’s no secret that application security professionals face an uphill battle as they attempt to influence development teams to remediate critical application vulnerabilities. But why is it such a...

    Read Article
  • Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    See what we found in studying the effectiveness of different remediation strategies.

    Read More
  • Get Ahead of Zero-Day Vulnerabilities With Kenna Security + Exodus Intelligence

    Get Ahead of Zero-Day Vulnerabilities With Kenna Security + Exodus Intelligence

    Zero-days vulnerabilities are unknown vulnerabilities. The exact definition is that they are vulnerabilities that have not been released to the public. The problem is that attackers may discover...

    Read Article
  • loading
    Loading More...