Ready to implement a Risk-Based Vulnerability Management approach?  
Download The Guide Now>
Contact Us
Talk to an Expert
Request a demo

Getting Real About Remediation with Cyentia Institute

Sep 9, 2020
Dan Mellinger

Share with Your Network

We discuss the second report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction, Volume 2: Getting Real About Remediation picks up on the overall vulnerability landscape analysis from Volume 1 and dives deep into the vulnerability landscape from within actual enterprise networks (a little over 500 of them to be exact).

Share with Your Network

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.


Read the Latest Content


[Podcast] Intrigue In Discovery and Digital Fingerprinting

Want more detail than Shodan queries? Need to figure out which devices have that new critical vuln and are exposed to the internet? Creator of, Jcran discusses his creation and touches on the topics of digital fingerprinting and discovery tools.


Say Hello to the Security Science Podcast

Working in technology communications for the last decade, I can unequivocally say that the best part of my job is the explanations of complex topics I regularly receive from the best and brightest minds in the industry.  It’s truly amazing to have the opportunity to learn about concepts like Machine Learning from Michael Roytman, how…


A Chronological Journey Through Risk-Based Vuln Management

Picking up where we left off on the history of vulnerability management, Ed Bellis walks us through the history of risk-based vulnerability management (RBVM) to current times and the near future. People Mentioned In The Episode:@adamshostack, @alexhutton, @anton_chuvakin, @apbarros, @benjamesedwards, @craiglawson, @jayjacobs, @mroytman, @oliverrochford, @PrateekBhajanka, @rybolov, @sasharomanosky, @wadebaker If you have any feedback or want to…


© 2020 Kenna Security. All Rights Reserved. Privacy Policy.