Other content in this Stream
Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness
See what we found in studying the effectiveness of different remediation strategies.
451 Research: Kenna Keeps Vulnerability Management Priorities in Check
Read this independent analysis of Kenna Security’s risk-based vulnerability management.
The Kenna Application Risk Module and Nexus Lifecycle: Security Across Your Entire Application Stack
Discover how, with Nexus Lifecycle fully integrated with the Kenna Application Risk Module, teams now have amplified visibility into open source.
Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds
Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.
Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence
Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.
Global Mining Case Study
MINING AND METALS GIANT PROTECTS ITS OPERATIONAL AND REPUTATIONAL INTEGRITY
The Benefits of Going With a Market Leader Data Sheet
See the timeline of Kenna Security’s innovative technologies.
Using Models to Predict and Prioritize Risk
Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.
Cyber Risk Context Technology™ Solution Brief
Find out more about the technology at the heart of the Kenna Security Platform.
Prioritization to Prediction, Volume 3 - Winning the Remediation Race
Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.
Genpact Reduces Cyber Risk with Data Science Approach
Prioritization to Prediction, Volume 2 - Getting Real About Remediation
Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.
Stop Playing Catch-Up on Application Risk
How to Measure, Report On, and Actually Reduce Vulnerability Risk
How to Implement a Risk-based Approach to Vulnerability Management
Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk
Application Security Report
Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.
Caveat Emptor: Is It Really “Data Science”?
In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...
Prioritization to Prediction Report, Volume 1
Analyzing Vulnerability Remediation Strategies
Black Hat USA 2018: The Year of “Risk-Based”