Blog – Kenna Security

Vulnerability Management & Risk Intelligence

  • Risk Efficiency: Kenna’s Standout ROI Metric

    Risk Efficiency: Kenna’s Standout ROI Metric

    Late last year I was given the task of developing a simple tool that would help quantify a customer’s return on investment (ROI) in Kenna solutions. Now, first let me clarify for you that we...

    Read Article
  • Patch Tuesday Rituals with JCran

    Patch Tuesday Rituals with JCran

    Both the bane and salvation of security teams, and the start of a month-long fix cycle for IT teams, Microsoft’s Patch Tuesday is a consistent reminder that nothing keeps us more secure than good...

    Read Article
  • DEF CON Is Canceled

    DEF CON Is Canceled

    I don’t know if you have heard, but DEF CON is canceled this year. No, seriously.  Yeah, I know DEF CON being canceled is a popular joke, but this year it is 100% for sure, really canceled! Please...

    Read Article
  • 5 Stars is Cool. Best Buy is Even Better. Here’s Why.

    5 Stars is Cool. Best Buy is Even Better. Here’s Why.

    When Jeff Heuer and I decided risk-based vulnerability management (RBVM) needed to be a thing a decade ago, we knew we were ushering in a more effective and efficient way for organizations to...

    Read Article
  • A Chronological Journey Through Risk-Based Vuln Management

    A Chronological Journey Through Risk-Based Vuln Management

    Picking up where we left off on the history of vulnerability management, Ed Bellis walks us through the history of risk-based vulnerability management (RBVM) to current times and the near future....

    Read Article
  • What is Modern Vulnerability Management?

    What is Modern Vulnerability Management?

    Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management. It leverages full visibility into a technology stack to target the...

    Read Article
  • Can Machine Learning Solve the Cybersecurity Skills Gap?

    Can Machine Learning Solve the Cybersecurity Skills Gap?

    Year after year we read about millions of unfilled cybersecurity jobs as incidents increase and Twitter experiences one of the most public cyber meltdowns in history. We talk with data scientist...

    Read Article
  • Considering Implementing Risk-Based Vulnerability Management? Start Here

    Considering Implementing Risk-Based Vulnerability Management? Start Here

    When TechValidate surveyed Kenna Security customers last year, one IT Security engineer observed that his organization’s Qualys vulnerability reports “were 12,000 pages long for 50 servers.”...

    Read Article
  • Analyzing Vulnerability Remediation Strategies with Cyentia Institute

    Analyzing Vulnerability Remediation Strategies with Cyentia Institute

    The first in a multi-part dive into the Prioritization to Prediction (P2P) research series by Kenna Security and The Cyentia Institute – guests Ed Bellis and Wade Baker discuss P2P Volume 1 which...

    Read Article
  • What is Risk-Based Vulnerability Management?

    What is Risk-Based Vulnerability Management?

    Risk-based vulnerability management (RBVM) is a cybersecurity strategy in which organizations prioritize remediation of software vulnerabilities according to the risk they pose to the...

    Read Article
  • [Podcast] Intrigue In Discovery and Digital Fingerprinting

    [Podcast] Intrigue In Discovery and Digital Fingerprinting

    Want more detail than Shodan queries? Need to figure out which devices have that new critical vuln and are exposed to the internet? Creator of Intrigue.io, Jcran discusses his creation and touches...

    Read Article
  • Employee Spotlight: Lattes with Linda Brown

    Employee Spotlight: Lattes with Linda Brown

    If perseverance was a person, it would be Linda Brown. It’s been almost four and a half years since Linda joined Kenna Security as a customer success engineer. Since then, she has climbed through...

    Read Article
  • Asset Risk In 3 Short Videos (and 1 Long One)

    Asset Risk In 3 Short Videos (and 1 Long One)

    When you examine vulnerabilities and try to derive patterns and lessons learned, it becomes clear that risk management is not just about the vulns. It is, in fact, very much about the assets. In...

    Read Article
  • [Podcast] Risk, Measured: Components of Cyber Risk

    [Podcast] Risk, Measured: Components of Cyber Risk

    The first episode in a Security Science mini-series called Risk, Measured – Kenna’s Chief Data Scientist, Michael Roytman discusses the theory and components used to measure risk.   Touching on...

    Read Article
  • Say Hello to the Security Science Podcast

    Say Hello to the Security Science Podcast

    Working in technology communications for the last decade, I can unequivocally say that the best part of my job is the explanations of complex topics I regularly receive from the best and brightest...

    Read Article
  • What is Vulnerability Management?

    What is Vulnerability Management?

    Vulnerability management is the process of proactively identifying, tracking, prioritizing, and remediating security weaknesses and flaws in IT systems and software in order to prevent malware...

    Read Article
  • Why Now Is the Time to Deep Clean Your Network

    Why Now Is the Time to Deep Clean Your Network

    The other weekend, as I was out grocery shopping, I saw my favorite local Mexican restaurant with their doors propped open as they deep cleaned their restaurant. Its staff was preparing for...

    Read Article
  • Employee Spotlight: Donuts with David Brothers

    Employee Spotlight: Donuts with David Brothers

    Here at Kenna Security we love recognizing the achievements of our employees, and we do so on a regular basis. Every quarter, however, we issue a special award (known as the Crush-IT Award) to one...

    Read Article
  • Why SC Media Named Kenna.VM its ‘Best Buy’ for Vulnerability Management

    Why SC Media Named Kenna.VM its ‘Best Buy’ for Vulnerability Management

    You know what’s nice? When someone else says something positive about you. You know what’s even nicer? When the people saying those things are some of the most knowledgeable cybersecurity experts...

    Read Article
  • For Vulnerability Management Performance, What Vendors Do Matters. (Perhaps More Than Anything Else.)

    For Vulnerability Management Performance, What Vendors Do Matters. (Perhaps More Than Anything Else.)

    What can you learn from observing how nearly 450 organizations manage vulnerabilities across more than 9 million assets? For one thing, you find out just how critical the actions (or inactions) of...

    Read Article
  • loading
    Loading More...