Let’s acknowledge one truth right from the beginning: being a cyber security professional in today’s environment is challenging. The pressure to digitally transform businesses, coupled with a tech stack of ever increasing complexity have created such a deluge of data that it is simply impossible for any organization to remediate every vulnerability and ensure 100% coverage of its attack surface.Effective remediation depends on quickly determining which vulnerabilities warrant action and which of those have highest priority, but prioritization remains one of the biggest challenges in vulnerability management. For the first time, Kenna Security and the Cyentia Institute took a quantitative look at the effectiveness of common remediation strategies and used that data as a baseline to compare against a cutting-edge predictive model. The results of this research are detailed in the new report, Prioritization To Prediction: Analyzing Vulnerability Remediation Strategies.
In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s...
Other content in this Stream
See what we found in studying the effectiveness of different remediation strategies.
Read this independent analysis of Kenna Security’s risk-based vulnerability management.
Discover how, with Nexus Lifecycle fully integrated with the Kenna Application Risk Module, teams now have amplified visibility into open source.
Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.
Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.
MINING AND METALS GIANT PROTECTS ITS OPERATIONAL AND REPUTATIONAL INTEGRITY
See the timeline of Kenna Security’s innovative technologies.
Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.
Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.
Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.
Learn the latest application security threats faced by organizations and the solutions to prevent and remediate them.
In my last blog I walked you through how to determine if a solution is indeed “risk-based.” This time let’s talk about “data science.” Like machine learning and artificial intelligence, the term...
Black Hat USA 2018 is now in the books. As usual, spending a week in Las Vegas was fun, exciting, educational, and eventful. Black Hat never disappoints on any of those fronts! In addition to the...
This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.
Security professionals know that they can’t close every vulnerability and prevent every threat. Despite advances in tools, tactics, and efficiency I constantly hear from security pros that they...