Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability in...
Other content in this Stream
See what we found in studying the effectiveness of different remediation strategies.
Read this independent analysis of Kenna Security’s risk-based vulnerability management.
Discover how, with Nexus Lifecycle fully integrated with the Kenna Application Risk Module, teams now have amplified visibility into open source.
Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.
Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.
See the timeline of Kenna Security’s innovative technologies.
Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.
Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.
Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.
Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.
In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...
Analyzing Vulnerability Remediation Strategies
Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...
This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.
Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...