Kenna Security is now part of Cisco

|Learn more
Contact Us
Talk to an Expert
Request a demo

Author Bio

John Alexander

Read My Posts

Risk, Threat, or Vulnerability? How to Tell the Difference

In cybersecurity, risk is the potential for loss, damage or destruction of assets or data. Threat is a negative event, such as the exploit of a vulnerability. And a vulnerability is a weakness that exposes you to threats, and therefore increases the likelihood of a negative event. This blog picks apart risk vs. threat vs….

Read More

Kenna.VI: Handling Red Alerts at Warp Speed

If you’ve worked in operational security handling vulnerability management, I’m sure you’ve found yourself in this situation. You’ve also seen it played out time and time again if you’ve worked for a company that sells a VM scanner. You’re sitting in the Captain’s chair and the red lights start flashing. The next big “named” vulnerability…

Read More

What is Vulnerability Remediation? Here’s a Primer

Vulnerability remediation is the patching or fixing of cybersecurity weaknesses that are detected in enterprise assets, networks and applications. Formerly a manual process, vulnerability remediation today is more automated, with advanced data science, threat intelligence, and predictive algorithms helping to determine which vulnerabilities should be remediated first.  Taking a risk-based approach helps IT and DevOps…

Read More

18+ Threat Intel Feeds Power Modern Vulnerability Management

One question we often get from customers or prospective clients is why we use 18+ threat feeds and exploit intelligence feeds? Seems excessive, right? Why not just 4 or 5 feeds? Or 10? Why do we use more than 18 threat feeds and exploit intelligence feeds to power the Kenna.VM modern vulnerability management platform?  The…

Read More

Risk Efficiency: Kenna’s Standout ROI Metric

Late last year I was given the task of developing a simple tool that would help quantify a customer’s return on investment (ROI) in Kenna solutions. Now, first let me clarify for you that we already had an ROI tool in-house; it was really good, albeit very complicated. This new request hinged on the “simple”…

Read More

Get Ahead of Zero-Day Vulnerabilities With Kenna Security + Exodus Intelligence

Zero-day vulnerabilities are vulnerabilities that have not been released to the public and are exploited on the same day as the weakness is discovered. The problem is that attackers may discover zero-day vulnerabilities and try to make use of them before they are made known to the software developer and a patch to fix the…

Read More
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.