Latest Content

  • Genpact CaseStudy

    Genpact CaseStudy

    Read More
  • Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    See what we found in studying the effectiveness of different remediation strategies.

    Read More
  • 451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    Read this independent analysis of Kenna Security’s risk-based vulnerability management.

    Read More
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • The Kenna Application Risk Module and Nexus Lifecycle: Security Across Your Entire Application Stack

    The Kenna Application Risk Module and Nexus Lifecycle: Security Across Your Entire Application Stack

    Discover how, with Nexus Lifecycle fully integrated with the Kenna Application Risk Module, teams now have amplified visibility into open source.

    Read More
  • Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds

    Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds

    Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.

    Read More
  • Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence

    Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence

    Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.

    Read More
  • Align Around Risk

    Request a Demo
  • Global Mining Case Study

    Global Mining Case Study

    MINING AND METALS GIANT PROTECTS ITS OPERATIONAL AND REPUTATIONAL INTEGRITY

    Read More
  • The Benefits of Going With a Market Leader Data Sheet

    The Benefits of Going With a Market Leader Data Sheet

    See the timeline of Kenna Security’s innovative technologies.

    Read More
  • [WEBINAR] How to Prioritize Application Vulnerabilities

    Watch Webinar
  • Using Models to Predict and Prioritize Risk

    Using Models to Predict and Prioritize Risk

    Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.

    Read More
  • Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.

    Read More
  • Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.

    Read More
  • Stop Playing Catch-Up on Application Risk

    Stop Playing Catch-Up on Application Risk

    Read More
  • How to Measure, Report On, and Actually Reduce Vulnerability Risk

    How to Measure, Report On, and Actually Reduce Vulnerability Risk

    Read More
  • How to Implement a Risk-based Approach to Vulnerability Management

    How to Implement a Risk-based Approach to Vulnerability Management

    Read More
  • Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk

    Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk

    Read More
  • Application Security Report

    Application Security Report

    Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.

    Read More
  • Caveat Emptor: Is It Really “Data Science”?

    Caveat Emptor: Is It Really “Data Science”?

    In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...

    Read Article
  • Prioritization to Prediction Report, Volume 1

    Prioritization to Prediction Report, Volume 1

    Analyzing Vulnerability Remediation Strategies

    Read More
  • Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018: The Year of “Risk-Based”

    Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...

    Read Article
  • Close What Matters: 5 Requirements for Reducing Vulnerability Risk

    Close What Matters: 5 Requirements for Reducing Vulnerability Risk

    This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.

    Read More
  • loading
    Loading More...