Blog – Kenna Security

Vulnerability Management & Risk Intelligence

  • [Podcast] Risk, Measured: Components of Cyber Risk

    [Podcast] Risk, Measured: Components of Cyber Risk

    The first episode in a Security Science mini-series called Risk, Measured – Kenna’s Chief Data Scientist, Michael Roytman discusses the theory and components used to measure risk.   Touching on...

    Read Article
  • Say Hello to the Security Science Podcast

    Say Hello to the Security Science Podcast

    Working in technology communications for the last decade, I can unequivocally say that the best part of my job is the explanations of complex topics I regularly receive from the best and brightest...

    Read Article
  • What is Vulnerability Management?

    What is Vulnerability Management?

    Vulnerability management is the process of proactively identifying, tracking, prioritizing, and remediating security weaknesses and flaws in IT systems and software in order to prevent malware...

    Read Article
  • Why Now Is the Time to Deep Clean Your Network

    Why Now Is the Time to Deep Clean Your Network

    The other weekend, as I was out grocery shopping, I saw my favorite local Mexican restaurant with their doors propped open as they deep cleaned their restaurant. Its staff was preparing for...

    Read Article
  • Employee Spotlight: Donuts with David Brothers

    Employee Spotlight: Donuts with David Brothers

    Here at Kenna Security we love recognizing the achievements of our employees, and we do so on a regular basis. Every quarter, however, we issue a special award (known as the Crush-IT Award) to one...

    Read Article
  • Why SC Media Named Kenna.VM its ‘Best Buy’ for Vulnerability Management

    Why SC Media Named Kenna.VM its ‘Best Buy’ for Vulnerability Management

    You know what’s nice? When someone else says something positive about you. You know what’s even nicer? When the people saying those things are some of the most knowledgeable cybersecurity experts...

    Read Article
  • For Vulnerability Management Performance, What Vendors Do Matters. (Perhaps More Than Anything Else.)

    For Vulnerability Management Performance, What Vendors Do Matters. (Perhaps More Than Anything Else.)

    What can you learn from observing how nearly 450 organizations manage vulnerabilities across more than 9 million assets? For one thing, you find out just how critical the actions (or inactions) of...

    Read Article
  • Find Out How Your Vulnerability Management Ranks Against Your Peers

    Find Out How Your Vulnerability Management Ranks Against Your Peers

    Here at Kenna Security we hear it from our customers a lot. They want to know how their vulnerability management efforts compare to their peers. And it makes sense. Having a benchmark is a good...

    Read Article
  • The Cost Savings of Effective Vulnerability Management (Part 3)

    The Cost Savings of Effective Vulnerability Management (Part 3)

    In our last blog of this series, we looked at how reducing friction between IT and security can boost efficiency for an organization—a critical benefit for any organization that finds themselves...

    Read Article
  • Employee Spotlight: Apples with Anna Garcia

    Employee Spotlight: Apples with Anna Garcia

    If our customers succeed, we succeed. This mission can seem intimidating, but thankfully, Kenna Security has dedicated Customer Success Engineers like Anna Garcia working day-in and day-out to...

    Read Article
  • Adapting Customer Experience Teams In Changing Times.

    Adapting Customer Experience Teams In Changing Times.

    The coronavirus pandemic has upended nearly all aspects of business. The rapid (and sometimes unplanned) shift to work from home arrangements has, in turn, led to increased demand for support at...

    Read Article
  • The 6 Cybersecurity Questions Your CEO Wants Answered

    The 6 Cybersecurity Questions Your CEO Wants Answered

    What is a CISO’s top priority? A PWC and Harvard Business Review study asked executives what they thought it should be, both now and in three years.  According to survey participants, today’s...

    Read Article
  • The Cost Savings of Effective Vulnerability Management (Part 2)

    The Cost Savings of Effective Vulnerability Management (Part 2)

    The other week, we kicked off this blog series with the proposition that a risk-based vulnerability management approach is more cost-effective than a traditional “everything is at risk” model....

    Read Article
  • New Names. Same Awesome Security Technology.

    New Names. Same Awesome Security Technology.

    Last week, we shared some exciting news that included updates to our existing risk-based vulnerability management product, two new connectors, as well as a brand new product that will help...

    Read Article
  • Introducing SLAs for Vulnerability Management

    Introducing SLAs for Vulnerability Management

    Difficult tasks with arbitrary deadlines.  If you work in cybersecurity, difficult tasks are nothing new. But they’re made unpleasant, and even impossible when the deadlines to complete them are...

    Read Article
  • New Product Updates Enable Intuitive, Data-Driven Vulnerability Management

    New Product Updates Enable Intuitive, Data-Driven Vulnerability Management

    Even though we’re all remote these days, we can feel the excitement here at Kenna Security today as we unveil some exciting updates to our existing modern vulnerability management product,...

    Read Article
  • The Cost Savings of Effective Vulnerability Management (Part 1)

    The Cost Savings of Effective Vulnerability Management (Part 1)

    As our world grapples with a changing economy, most businesses are being asked to stretch budgets as far as they will go. “Do more with less” is hitting home now more than ever.  For those of us...

    Read Article
  • For CISOs Trying to Reduce Risk, New Research Reveals the Value of Focusing on Assets

    For CISOs Trying to Reduce Risk, New Research Reveals the Value of Focusing on Assets

    These days, it’s natural for executives charged with operating and protecting enterprise IT infrastructure to feel a little overwhelmed. Millions more employees are now working from home, testing...

    Read Article
  • Employee Spotlight: Coffee with Karim Toubba

    Employee Spotlight: Coffee with Karim Toubba

    My first week at Kenna Security in early December 2019 was predictably busy: new-hire paperwork, meeting new teammates, getting to know Kenna’s amazing technology, etc. But among invites to...

    Read Article
  • Why CIOs Should Focus On Vulnerability Management Right Now

    Why CIOs Should Focus On Vulnerability Management Right Now

    Few aspects of business look anything like they did even a week or two ago. Business travel is now virtually non-existent. Millions more employees are working from home, stressing corporate VPNs...

    Read Article
  • loading
    Loading More...