Learn more.
Contact Us
Talk to an Expert
Request a demo

Author Bio

Jason Rolleston
Chief Product Officer
Ask a product manager a question and "it depends" is the answer at least 80% of the time. Jason is no different, but he does take the time to explain why. Want to know more of the why? Check in here.

WHAT HE REALLY DOES: Leads a team that brings clarity to the chaos of customer requests and field feedback, distills insight into actionable direction for engineering, and ensures the resulting innovation gets to market.


WHY READ HIS BLOG: Has been walking and talking tech and market strategy for longer than he’ll admit, but knows that you’ve got to nail down the people and the process to unlock value. He’ll share insights from both sides of the coin in his blogs.

ODD FACT: He’s sneakily tall.

Read My Posts

Analysts Agree: Risk-Based Vulnerability Management a Priority for 2021

Taking a risk-based approach to vulnerability management has always been our priority, and lately the industry has followed suit. Now in a new blog listing Gartner’s Top 10 Security Projects for 2020-2021, it’s clear that Gartner thinks it should be a priority for you, too. For a sense of why RBVM is a top priority…

Read More

Kenna Security and VMware Carbon Black Collaborate to Provide Risk Prioritization to Cloud Workloads

The challenge of cloud-based applications is that workloads may move through several different environments that can be owned and operated by vendors with different technology. With the cloud there are no well-defined boundaries. VMware Carbon Black Cloud Workload is a product that has been designed from the ground up to protect cloud workloads that operate…

Read More

Key Take-Aways for IT from the Latest Vulnerability Management Research

In some ways, IT is in a tough spot when it comes to reducing cyber risk. IT teams are usually responsible for remediating vulnerabilities within various asset groups. But even though IT groups ultimately own assets, they often don’t have full control over which assets end up where. End-user devices, for instance, have a tendency…

Read More

Vulnerability Management Maturity Part Four: First Came the Sprint, Now the Marathon.

So there you are, the head of a successful vulnerability management program that has driven your company’s risk scores to a level that is both manageable and acceptable.  It’s been smooth sailing for the past year, and the days of chaos are but a memory. And then all of the sudden, the risk score jumps. …

Read More

Modern Vulnerability Management Part 3: Engaging Auto-Pilot

One of the odd things about risk is that it doesn’t mean the same thing to all people. We happily ride in cars almost every day, despite the fact that on a mile-for-mile basis, it represents one of the most dangerous forms of transportation. But many of us will get a weird feeling in the…

Read More

Vulnerability Management Maturity Part Two: Training Day

It’s safe to say that most modern enterprises live and breathe data. But not all data is created equal. Take, for example, the data used in early stage vulnerability management programs.  Go beyond CVSS Sure, they use data. When their scanners detect a vulnerability, it gets added to a spreadsheet. To estimate the risk that…

Read More

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.