Vulnerability Management

  • Go Beyond Application Vulnerability Correlation White Paper

    Go Beyond Application Vulnerability Correlation White Paper

    Read More
  • Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness

    See what we found in studying the effectiveness of different remediation strategies.

    Read More
  • Give us 5 minutes and 1,000 assets – we'll give you a full picture of your risk

    Start Free Trial
  • 451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    451 Research: Kenna Keeps Vulnerability Management Priorities in Check

    Read this independent analysis of Kenna Security’s risk-based vulnerability management.

    Read More
  • Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds

    Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds

    Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.

    Read More
  • Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence

    Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence

    Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.

    Read More
  • [WEBINAR] Welcome to Next-Gen Vulnerability Management

    Watch Webinar
  • The Benefits of Going With a Market Leader Data Sheet

    The Benefits of Going With a Market Leader Data Sheet

    See the timeline of Kenna Security’s innovative technologies.

    Read More
  • Using Models to Predict and Prioritize Risk

    Using Models to Predict and Prioritize Risk

    Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.

    Read More
  • Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Prioritization to Prediction, Volume 3 - Winning the Remediation Race

    Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.

    Read More
  • Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Prioritization to Prediction, Volume 2 - Getting Real About Remediation

    Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.

    Read More
  • When Vulnerability Management Stops Being Polite & Starts Getting Real

    When Vulnerability Management Stops Being Polite & Starts Getting Real

    In my post in December, “Vulns Will Survive,” I shared some interesting data about the survivability rate of vulnerabilities in the enterprise. At the very end of the post, I promised to share...

    Read Article
  • How to Measure, Report On, and Actually Reduce Vulnerability Risk

    How to Measure, Report On, and Actually Reduce Vulnerability Risk

    Read More
  • Prioritization to Prediction Report, Volume 1

    Prioritization to Prediction Report, Volume 1

    Analyzing Vulnerability Remediation Strategies

    Read More
  • How Financial Institutions Can Effectively Manage Cyber Risk

    How Financial Institutions Can Effectively Manage Cyber Risk

    This white paper explains how financial institutions can gain the upper hand against cyber criminals by taking a risk-based approach to vulnerabilities.

    Read More
  • Five Requirements for Effective Cyber Risk Management

    Five Requirements for Effective Cyber Risk Management

    When it comes to vulnerability management, it’s all about quality not quantity. It doesn’t matter how many vulnerabilities you closed last month if you left open the one high risk (high quality,...

    Read Article
  • The Concept of Measuring Recall in Cybersecurity

    The Concept of Measuring Recall in Cybersecurity

    In a recent article for the USENIX magazine, In-Q-Tel CISO Dan Geer and Kenna Chief Data Scientist Michael Roytman discuss the importance of measuring the concept of recall in cybersecurity. If...

    Read Article
  • How to Harness Supervised Machine Learning to Predict Exploitability

    How to Harness Supervised Machine Learning to Predict Exploitability

    Artificial intelligence and machine learning are dominating topics in the tech world. Every day our news feeds are flooded with promises of revolutionary applications of these systems, from smart...

    Read Article
  • Sitting in the Dark? Shine a Light on Your True Risk.

    Sitting in the Dark? Shine a Light on Your True Risk.

    In 2011, Kenna Security pioneered a risk-based approach to vulnerability management, enabling enterprises to prioritize and actively manage their vulnerabilities based on the most informed and...

    Read Article
  • How to Manage Vulnerabilities Based on Risk, Rather than Popularity

    How to Manage Vulnerabilities Based on Risk, Rather than Popularity

    This white paper introduces the four key factors security organizations should consider to move beyond hype when it comes to identifying and prioritizing vulnerabilities.

    Read More
  • Close What Matters: 5 Requirements for Reducing Vulnerability Risk

    Close What Matters: 5 Requirements for Reducing Vulnerability Risk

    This whitepaper discusses the essential steps your organization needs to prioritize high-risk vulnerabilities and significantly reduce the risk of leaving a targeted vulnerability open.

    Read More
  • How to Operationalize a Risk-based Approach to Vulnerability Management

    How to Operationalize a Risk-based Approach to Vulnerability Management

    When large enterprises like Equifax lose sensitive data because a known vulnerability was left unpatched, something clearly isn’t working. Cyber attackers continually evolve their tactics, and...

    Read Article
  • loading
    Loading More...