Blog – Kenna Security

Vulnerability Management & Risk Intelligence

  • Standard Vulnerability Management Isn’t Enough

    Standard Vulnerability Management Isn’t Enough

    There are dozens of vulnerability scanners on the market today. Their job is to do exactly what their name implies—scan your environment to find vulnerabilities. In fact, these vulnerability...

    Read Article
  • When Vulnerability Management Stops Being Polite & Starts Getting Real

    When Vulnerability Management Stops Being Polite & Starts Getting Real

    In my post in December, “Vulns Will Survive,” I shared some interesting data about the survivability rate of vulnerabilities in the enterprise. At the very end of the post, I promised to share...

    Read Article
  • Industry Benchmarks: You Can Get With This, Or You Can Get With That

    Industry Benchmarks: You Can Get With This, Or You Can Get With That

    In my previous role as a CISO, I probably received two questions far more than any others. The first, “Are we secure?” was a terrible and loaded question that required you to know your audience...

    Read Article
  • CUSTOMER BLOG: Submit Your Feedback for a Chance to Win

    CUSTOMER BLOG: Submit Your Feedback for a Chance to Win

    Hey, Kenna Customers! Want to “get away” from all of this winter? Your review could net you a brand-new VR system! Winter is cold (in some places more than others). Imagine if you had your very...

    Read Article
  • Application Vulnerability Management Requires a Risk-based Approach

    Application Vulnerability Management Requires a Risk-based Approach

    Application security teams face unique and often daunting challenges. It’s their job to protect the organization from application vulnerabilities that can lead to data breaches. Yet, with all of...

    Read Article
  • Cyber Threat Trends From 2018 and Into 2019

    Cyber Threat Trends From 2018 and Into 2019

    It’s that time of year, the time to reflect on what we learned in the past year and look forward  to the next. Several new vulnerability and threat trends emerged in 2018, and we anticipate a they...

    Read Article
  • Vulns Will Survive

    Vulns Will Survive

    Oh no, not I, I will survive Oh, as long as I know how to hide, I know I’ll stay alive I’ve got all my life to live And I’ve got all my risk to give and I’ll survive. I will survive, hey hey! ~...

    Read Article
  • Don’t Take it From Us: 6 Ways Kenna Transforms Vulnerability Management for Our Customers

    At Kenna Security, our customers have been a driving force behind the evolution of the platform since the beginning. We love to hear from the people who use the platform every day, and we want to...

    Read Article
  • Kenna Security Listed on Deloitte’s 2018 Technology Fast 500™ – A Few Words of Thanks

    One of the best parts of my job here at Kenna involves spending time with our customers, partners, and prospects. They’re passionate about protecting their companies and many are extremely engaged...

    Read Article
  • With New Features, Kenna Security Continues to Raise the Bar

    With New Features, Kenna Security Continues to Raise the Bar

    Successful vulnerability management takes more than just a technical understanding of cybersecurity. It requires that security professionals consider what they’re seeing in their environment in...

    Read Article
  • Patch Tuesday Briefing – November 2018

    Patch Tuesday Briefing – November 2018

    As a service to our customers, we post a monthly update when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • A primer on Kenna and truly predictive (and now patented) vulnerability management

    A primer on Kenna and truly predictive (and now patented) vulnerability management

    As we at Kenna work hard to expand our pioneering technology in risk-based vulnerability management, we recently received good news. We were granted a patent for our exploit prediction...

    Read Article
  • 8 Common Vulnerability Management Mistakes to Avoid

    8 Common Vulnerability Management Mistakes to Avoid

    Vulnerability management is often undersourced and undertooled, and yet stands at the epicenter of protecting the organization from a breach. Bringing to bear best practices can mean the...

    Read Article
  • Are You Taking a Modern Approach to Cybersecurity?

    Are You Taking a Modern Approach to Cybersecurity?

    One of my favorite quotes of all time is the definition of insanity. While there are several variations, they all boil down to doing the same thing over and over again but expecting different...

    Read Article
  • Logic Errors and Best Practices for Preventing Them

    Logic Errors and Best Practices for Preventing Them

    By now you’ve undoubtedly heard about the Facebook breach. I’ve published an article in Dark Reading that goes into detail on what happened at Facebook and my views on the important lessons we can...

    Read Article
  • October 2018 Patch Tuesday Briefing

    As a service to our customers, we post a monthly update when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • Kenna Earns Major Recognition for Our Risk-Based Approach

    Kenna Earns Major Recognition for Our Risk-Based Approach

    From the beginning, Kenna Security has focused on giving organizations a new way to approach cybersecurity by focusing on reducing risk by predicting, preventing, and pre-empting attacks—before...

    Read Article
  • Caveat Emptor: Is It Really “Data Science”?

    Caveat Emptor: Is It Really “Data Science”?

    In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...

    Read Article
  • September 2018 Patch Tuesday Briefing

    As a service to our customers, we post a monthly bulletin when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • Today Is The Day to Implement Risk-Based Vulnerability Management

    Just the other week Anton Chuvakin from Gartner published an article in response to a skeptic of vulnerability management (VM). They asked him, “…why bother focusing on your vulnerabilities at...

    Read Article
  • loading
    Loading More...