Other content in this Stream
Prioritization to Prediction, Volume 2 - Getting Real About Remediation
Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.
Stop Playing Catch-Up on Application Risk
How to Measure, Report On, and Actually Reduce Vulnerability Risk
How to Implement a Risk-based Approach to Vulnerability Management
Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk
Application Security Report
Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.
Caveat Emptor: Is It Really “Data Science”?
In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...
Prioritization to Prediction Report, Volume 1
Analyzing Vulnerability Remediation Strategies
Black Hat USA 2018: The Year of “Risk-Based”
Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...
Close What Matters: 5 Requirements for Reducing Vulnerability Risk
This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.
Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle
Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...
Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management
TransUnion CISO Jasper Ossentjuk believes that with the increased pace of automated and targeted attacks, InfoSec teams have to work smarter—not harder. That means the old methods of vulnerability ma
Some Highlights From RSA 2018
This years’ RSA Conference was massive, gathering more than 40,000 attendees and over 500 vendors to showcase the latest tech, tools and tactics in the cyber security industry. Our latest...
Kenna Helped PTC Determine What to Fix First
PTC’s security environment isn’t exactly simple. They have thousands of servers spread over multiple data centers. And their team was overwhelmed with security scan data. How did they make sense of
Application Risk Management: Navigating the Storm
Did you know that enterprises have anywhere from a few hundred to several thousand applications running on thousands of assets across their networks? Do the math on those numbers, and you’re...
Kenna Security’s CEO Discusses ‘Why Can’t Organizations Patch Their Networks?’ With Task Force 7 Radio
Kenna Security’s CEO Karim Toubba was recently featured on Task Force 7 Cyber Security Radio, where he discussed risk management and remediation with host George Rettas. During the interview,...
How to Harness Supervised Machine Learning to Predict Exploitability