Blog – Kenna Security

Vulnerability Management & Risk Intelligence

  • Don’t Stop Me Now: The Race to Remediation Is On

    Don’t Stop Me Now: The Race to Remediation Is On

    “That’s why they call me Mr. Fahrenheit, cause I’m patching at the speed of light!” – Freddie Mercury(ish). Over the past several months, my team and I have worked with the Cyentia Institute to...

    Read Article
  • One Hacker’s Guide to the Week of RSAC 2019

    One Hacker’s Guide to the Week of RSAC 2019

    Next week, starting on March 3rd, I will be in the Bay Area for both BSides SF and RSA Conference (RSAC) 2019. As a security professional (and a hacker, the good kind) working for a security...

    Read Article
  • Comprehensive Application Security Requires Open Source Vulnerability Detection

    Comprehensive Application Security Requires Open Source Vulnerability Detection

    Modern application security programs have unique requirements based on the complexity of the applications, themselves. Apps are comprised of multiple components, including runtime libraries,...

    Read Article
  • CUSTOMER BLOG: Share your opinion and support the Chicago Tech Academy!

    CUSTOMER BLOG: Share your opinion and support the Chicago Tech Academy!

    With one of our main offices in the Chicago area, the West Loop to be specific, we’re a big fan of local Chicago initiatives, especially relating to education. Our engineering teams have hosted...

    Read Article
  • From the Desk of the CEO: Looking Back to Look Forward

    From the Desk of the CEO: Looking Back to Look Forward

    With our employee all-hands and sales kickoff event just behind us and RSAC coming in early March, I wanted to take a moment to reflect on what I’ve seen, what I’m thankful for in my time here at...

    Read Article
  • Power to the Partner!

    Power to the Partner!

    Just a few weeks ago I headed off to Chicago—yes, into the polar vortex—to join my colleagues and friends at our yearly all-hands and sales kickoff for a week of learning, planning, celebrating....

    Read Article
  • All These Vulnerabilities Rarely Matter

    All These Vulnerabilities Rarely Matter

    As security professionals, we’ve all been in a situation where we’ve been presented with a large list of vulnerabilities in our systems, but we have limited time and budget to address them. In...

    Read Article
  • No Pain, No Gain: Why Shifting to DevOps Is Worth It for Your Organization

    No Pain, No Gain: Why Shifting to DevOps Is Worth It for Your Organization

    I’ve been pretty vocal lately about the need to shift security left and introduce it earlier in the development lifecycle. In fact, in a Dark Reading article I wrote toward the end of last year I...

    Read Article
  • Standard Vulnerability Management Isn’t Enough

    Standard Vulnerability Management Isn’t Enough

    There are dozens of vulnerability scanners on the market today. Their job is to do exactly what their name implies—scan your environment to find vulnerabilities. In fact, these vulnerability...

    Read Article
  • When Vulnerability Management Stops Being Polite & Starts Getting Real

    When Vulnerability Management Stops Being Polite & Starts Getting Real

    In my post in December, “Vulns Will Survive,” I shared some interesting data about the survivability rate of vulnerabilities in the enterprise. At the very end of the post, I promised to share...

    Read Article
  • Industry Benchmarks: You Can Get With This, Or You Can Get With That

    Industry Benchmarks: You Can Get With This, Or You Can Get With That

    In my previous role as a CISO, I probably received two questions far more than any others. The first, “Are we secure?” was a terrible and loaded question that required you to know your audience...

    Read Article
  • CUSTOMER BLOG: Submit Your Feedback for a Chance to Win

    CUSTOMER BLOG: Submit Your Feedback for a Chance to Win

    Hey, Kenna Customers! Want to “get away” from all of this winter? Your review could net you a brand-new VR system! Winter is cold (in some places more than others). Imagine if you had your very...

    Read Article
  • Application Vulnerability Management Requires a Risk-based Approach

    Application Vulnerability Management Requires a Risk-based Approach

    Application security teams face unique and often daunting challenges. It’s their job to protect the organization from application vulnerabilities that can lead to data breaches. Yet, with all of...

    Read Article
  • Cyber Threat Trends From 2018 and Into 2019

    Cyber Threat Trends From 2018 and Into 2019

    It’s that time of year, the time to reflect on what we learned in the past year and look forward  to the next. Several new vulnerability and threat trends emerged in 2018, and we anticipate a they...

    Read Article
  • Vulns Will Survive

    Vulns Will Survive

    Oh no, not I, I will survive Oh, as long as I know how to hide, I know I’ll stay alive I’ve got all my life to live And I’ve got all my risk to give and I’ll survive. I will survive, hey hey! ~...

    Read Article
  • Don’t Take it From Us: 6 Ways Kenna Transforms Vulnerability Management for Our Customers

    At Kenna Security, our customers have been a driving force behind the evolution of the platform since the beginning. We love to hear from the people who use the platform every day, and we want to...

    Read Article
  • Kenna Security Listed on Deloitte’s 2018 Technology Fast 500™ – A Few Words of Thanks

    One of the best parts of my job here at Kenna involves spending time with our customers, partners, and prospects. They’re passionate about protecting their companies and many are extremely engaged...

    Read Article
  • With New Features, Kenna Security Continues to Raise the Bar

    With New Features, Kenna Security Continues to Raise the Bar

    Successful vulnerability management takes more than just a technical understanding of cybersecurity. It requires that security professionals consider what they’re seeing in their environment in...

    Read Article
  • Patch Tuesday Briefing – November 2018

    Patch Tuesday Briefing – November 2018

    As a service to our customers, we post a monthly update when Patch Tuesday (second Tuesday of every month) rolls around. Below, you’ll find information about the new updates released from...

    Read Article
  • A primer on Kenna and truly predictive (and now patented) vulnerability management

    A primer on Kenna and truly predictive (and now patented) vulnerability management

    As we at Kenna work hard to expand our pioneering technology in risk-based vulnerability management, we recently received good news. We were granted a patent for our exploit prediction...

    Read Article
  • loading
    Loading More...