Other content in this Stream
Go Beyond Application Vulnerability Correlation White Paper
Using Coverage and Efficiency to Determine Remediation Strategy Effectiveness
See what we found in studying the effectiveness of different remediation strategies.
451 Research: Kenna Keeps Vulnerability Management Priorities in Check
Read this independent analysis of Kenna Security’s risk-based vulnerability management.
Kenna Predictive Modeling Technology Enhanced with Proofpoint ET Intelligence Feeds
Find out how Proofpoint ET Intelligence Feeds enhance Kenna’s predictive modeling technology.
Kenna Risk-Based Vulnerability Management Enriched with Exodus Zero-Day Intelligence
Find out how Exodus’ zero-day intelligence enhances Kenna’s already rich set of risk-based vulnerability information.
The Benefits of Going With a Market Leader Data Sheet
See the timeline of Kenna Security’s innovative technologies.
Using Models to Predict and Prioritize Risk
Find out what to look for in a risk model and how the Kenna Security Risk Model can prioritize and predict risk.
Cyber Risk Context Technology™ Solution Brief
Find out more about the technology at the heart of the Kenna Security Platform.
Prioritization to Prediction, Volume 3 - Winning the Remediation Race
Produced in conjunction with the Cyentia Institute, this third volume of our Prioritization to Prediction series explores and analyzes the vulnerability management landscape.
Prioritization to Prediction, Volume 2 - Getting Real About Remediation
Our latest research, in collaboration with the Cyentia Institute, takes a rare look at the vulnerability management strategies of leading enterprises.
When Vulnerability Management Stops Being Polite & Starts Getting Real
In my post in December, “Vulns Will Survive,” I shared some interesting data about the survivability rate of vulnerabilities in the enterprise. At the very end of the post, I promised to share...
How to Measure, Report On, and Actually Reduce Vulnerability Risk
Prioritization to Prediction Report, Volume 1
Analyzing Vulnerability Remediation Strategies
Living with a Target on Your Back: How Financial Institutions Can Effectively Manage Cyber Risk
This white paper explains how financial institutions can gain the upper hand against cyber criminals by taking a risk-based approach to vulnerabilities.
Five Requirements for Effective Cyber Risk Management
When it comes to vulnerability management, it’s all about quality not quantity. It doesn’t matter how many vulnerabilities you closed last month if you left open the one high risk (high quality,...
The Concept of Measuring Recall in Cybersecurity
In a recent article for the USENIX magazine, In-Q-Tel CISO Dan Geer and Kenna Chief Data Scientist Michael Roytman discuss the importance of measuring the concept of recall in cybersecurity. If...
How to Harness Supervised Machine Learning to Predict Exploitability
Artificial intelligence and machine learning are dominating topics in the tech world. Every day our news feeds are flooded with promises of revolutionary applications of these systems, from smart...
Sitting in the Dark? Shine a Light on Your True Risk.
In 2011, Kenna Security pioneered a risk-based approach to vulnerability management, enabling enterprises to prioritize and actively manage their vulnerabilities based on the most informed and...
How to Manage Vulnerabilities Based on Risk, Rather than Popularity
This white paper introduces the four key factors security organizations should consider to move beyond hype when it comes to identifying and prioritizing vulnerabilities.
Close What Matters: 5 Requirements for Reducing Vulnerability Risk