Learn more.
Contact Us
Talk to an Expert
Request a demo

Author Bio

Dan Mellinger
Senior Director of Corporate Communications
Ever-searching for the stories that data wants to tell, Dan is a weekly podcaster, constant social media poster, persistent pitchman, and occasional blogger.

WHAT HE REALLY DOES: Manages Kenna’s communications function, including PR, AR, SM, and a whole bunch of other acronyms that he refuses to clarify but insists are very important.


WHY READ HIS BLOG: From running PR for Alienware to communications for Fortinet, Dan loves immersing himself in highly complex technologies and finding the compelling stories to tell.


ODD FACT: Dan knows every line of Romeo & Juliet thanks to the “awesome” mid-90s movie. (Yeah, the one with Danes and DiCaprio. Just don’t ask.)

Read My Posts

Vulnerability Disclosure and Responsible Exposure

We discuss and add some quantifiable data to a hot-button issue in the cybersecurity industry: responsible disclosure of vulnerabilities and exploits.

Read More

Risk, Measured: 7 Characteristics of Good Metrics

Continuing our miniseries into Risk, Measured: we go back to statistics class and discuss some of the characteristics of good metrics to help people understand what you should be looking for when you want to meaningfully quantify cybersecurity phenomena, program performance, or anything really.

Read More

Why Vuln Scores Can’t Be Looked At in a Vacuum

Sometimes a number is just a number. Context – the information and environment around the number – is what really matters. We discuss how this concept holds especially true in vulnerability management and risk scoring.

Read More

More Blue Team Voices

We discuss the general lack of defensive perspectives in cybersecurity media and culture, how that impacts perceptions and decision making, and what we can do about it.

Read More

Risk, Measured: Power Laws and Security

We’re picking back up on our “Risk, Measured” series where we dive into specific concepts used to measure risk within the context of cybersecurity. We discuss the application of power law distributions to cybersecurity.  

Read More

Github as a Source for Exploits?

We look at the phenomena of exploit code moving from traditional and cybersecurity-centric databases like Exploit-DB and Metasploit and instead being published on Github. Is Github becoming a de facto database for exploit code? Transcript Dan Mellinger: Today on Security Science, is GitHub the new source for exploits? Hello, and thank you for joining us. I’m…

Read More

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.