Other content in this Stream
Global Mining Case Study
MINING AND METALS GIANT PROTECTS ITS OPERATIONAL AND REPUTATIONAL INTEGRITY
The Benefits of Going With a Market Leader Data Sheet
See the timeline of Kenna Security’s innovative technologies.
Using Models to Predict and Prioritize Risk
Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.
Cyber Risk Context Technology™ Solution Brief
Find out more about the technology at the heart of the Kenna Security Platform.
Prioritization to Prediction, Volume 3 - Winning the Remediation Race
Genpact Reduces Cyber Risk with Data Science Approach
Prioritization to Prediction, Volume 2 - Getting Real About Remediation
Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.
Stop Playing Catch-Up on Application Risk
How to Measure, Report On, and Actually Reduce Vulnerability Risk
How to Implement a Risk-based Approach to Vulnerability Management
Making Data-Driven Security Decisions That Matter: Stop Analyzing Data and Start Reducing Risk
Application Security Report
Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.
Caveat Emptor: Is It Really “Data Science”?
In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...
Prioritization to Prediction Report, Volume 1
Analyzing Vulnerability Remediation Strategies
Black Hat USA 2018: The Year of “Risk-Based”
Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...
Close What Matters: 5 Requirements for Reducing Vulnerability Risk
This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.
Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle
Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...
Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management
TransUnion CISO Jasper Ossentjuk believes that with the increased pace of automated and targeted attacks, InfoSec teams have to work smarter—not harder. That means the old methods of vulnerability ma
Some Highlights From RSA 2018
This years’ RSA Conference was massive, gathering more than 40,000 attendees and over 500 vendors to showcase the latest tech, tools and tactics in the cyber security industry. Our latest...
Kenna Helped PTC Determine What to Fix First