Blog – Kenna Security

Vulnerability Management & Risk Intelligence

  • With New Features, Kenna Security Continues to Raise the Bar

    With New Features, Kenna Security Continues to Raise the Bar

    Successful vulnerability management takes more than just a technical understanding of cybersecurity. It requires that security professionals consider what they’re seeing in their environment in...

    Read Article
  • Patch Tuesday Briefing – November 2018

    Patch Tuesday Briefing – November 2018

    As a service to our customers, we post a monthly update when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • A primer on Kenna and truly predictive (and now patented) vulnerability management

    A primer on Kenna and truly predictive (and now patented) vulnerability management

    As we at Kenna work hard to expand our pioneering technology in risk-based vulnerability management, we recently received good news. We were granted a patent for our exploit prediction...

    Read Article
  • 8 Common Vulnerability Management Mistakes to Avoid

    8 Common Vulnerability Management Mistakes to Avoid

    Vulnerability management is often undersourced and undertooled, and yet stands at the epicenter of protecting the organization from a breach. Bringing to bear best practices can mean the...

    Read Article
  • Are You Taking a Modern Approach to Cybersecurity?

    Are You Taking a Modern Approach to Cybersecurity?

    One of my favorite quotes of all time is the definition of insanity. While there are several variations, they all boil down to doing the same thing over and over again but expecting different...

    Read Article
  • Logic Errors and Best Practices for Preventing Them

    Logic Errors and Best Practices for Preventing Them

    By now you’ve undoubtedly heard about the Facebook breach. I’ve published an article in Dark Reading that goes into detail on what happened at Facebook and my views on the important lessons we can...

    Read Article
  • October 2018 Patch Tuesday Briefing

    As a service to our customers, we post a monthly update when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • Kenna Earns Major Recognition for Our Risk-Based Approach

    Kenna Earns Major Recognition for Our Risk-Based Approach

    From the beginning, Kenna Security has focused on giving organizations a new way to approach cybersecurity by focusing on reducing risk by predicting, preventing, and pre-empting attacks—before...

    Read Article
  • Caveat Emptor: Is It Really “Data Science”?

    Caveat Emptor: Is It Really “Data Science”?

    In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...

    Read Article
  • September 2018 Patch Tuesday Briefing

    As a service to our customers, we post a monthly bulletin when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • Today Is The Day to Implement Risk-Based Vulnerability Management

    Just the other week Anton Chuvakin from Gartner published an article in response to a skeptic of vulnerability management (VM). They asked him, “…why bother focusing on your vulnerabilities at...

    Read Article
  • August 2018 Patch Tuesday Briefing

    Update 2018-08-15: CVE-2018-8414 (Windows Shell Remote Code Execution Vulnerability) and CVE-2018-8373 (Internet Explorer Scripting Engine Memory Corruption Vulnerability) are reported to be under...

    Read Article
  • Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...

    Read Article
  • Staying Secure and Productive at Black Hat

    Staying Secure and Productive at Black Hat

    Are you going to Black Hat and Defcon (colloquially known as summer camp) and are tired of the “leave anything that plugs in at home” advice? Here are some realistic best practices to help you...

    Read Article
  • The Concept of Measuring Recall in Cybersecurity

    The Concept of Measuring Recall in Cybersecurity

    In a recent article for the USENIX magazine, In-Q-Tel CISO Dan Geer and Kenna Chief Data Scientist Michael Roytman discuss the importance of measuring the concept of recall in cybersecurity. If...

    Read Article
  • July 2018 Patch Tuesday Briefing

    As a service to our customers, we’ll be posting a monthly bulletin when Patch Tuesday (second Tuesday of every month) rolls around going forward. Below, you’ll find information about the new...

    Read Article
  • Sitting in the Dark? Shine a Light on Your True Risk.

    Sitting in the Dark? Shine a Light on Your True Risk.

    In 2011, Kenna Security pioneered a risk-based approach to vulnerability management, enabling enterprises to prioritize and actively manage their vulnerabilities based on the most informed and...

    Read Article
  • Take a Risk-based Approach to Application Security

    Take a Risk-based Approach to Application Security

    If you’re an application security professional, chances are that you face some major uphill battles every day. First, you need to somehow influence your development team to fix the vulnerabilities...

    Read Article
  • Widespread Google Groups Misconfiguration Exposes Sensitive Information

    Widespread Google Groups Misconfiguration Exposes Sensitive Information

    Summary A widespread misconfiguration in Google Groups for organizations utilizing G Suite was recently investigated and reported to Google by the Kenna Security Research Team. This blog post...

    Read Article
  • Working with TransUnion to Improve Their Remediation Strategy

    Working with TransUnion to Improve Their Remediation Strategy

    Since 2015, Kenna Security has been working with TransUnion to be proactive on their vulnerability management using the Kenna Security Platform. Prior to working with us, they had difficulty with...

    Read Article
  • loading
    Loading More...