Kenna Security’s CEO Discusses ‘Why Can’t Organizations Patch Their Networks?’ With Task Force 7 Radio

Apr 4, 2018
Kenna Security

Share with Your Network

Kenna Security’s CEO Karim Toubba was recently featured on Task Force 7 Cyber Security Radio, where he discussed risk management and remediation with host George Rettas. During the interview, Karim shared why the root causes of so many breaches lead back to unpatched systems, and what actions security organizations should take when they learn they are vulnerable to the same types of attacks that they see affecting other companies in the news.

Karim also shared his thoughts on:

  • How companies should apply tactical and strategic risk strategies to mitigate vulnerabilities and understand their overall risk posture
  • The overall effectiveness of the most commonly employed tactics for mitigating known vulnerabilities
  • Why miscommunication across departments and teams leads to breaches
  • How speed and prioritizing are necessities when patching networks
  • Why security teams need to move beyond outdated and inefficient Excel sheets to manage risk
  • The relative efficacy of the most popular vulnerability scanning tools used in the marketplace


Listen here:

About Task Force 7 Cyber Security Radio

Task Force 7 Radio is the Voice of Cyber Security around the globe. We feature up to date insights and analysis by preeminent cyber security professionals on the most important cyber security issues affecting your life today.

Although the world of cyber security can be complex, our focus is to explain highly technical subject matter in non-technical terms. We cover topics that are of vital interest to the cyber security expert yet also will appeal to the novice interested in learning more about cyber security and new threats affecting the social, political, business, and economic concerns of our world.

We explore a wide range of controversial issues that you won’t want to miss each week. Task Force 7 Radio is broadcast live every Monday at 8 PM Eastern Time, 5 PM Pacific Time, on the VoiceAmerica Business Channel.


Read the Latest Content

Research Reports

Prioritization to Prediction Volume 5: In Search of Assets at Risk

The fifth volume of the P2P series explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities.

5 Things Every CIO Should Know About Vulnerability Management

If you view vulnerability management (VM) as just a small part of your operation, it might be time to take another look.  Managing vulnerabilities is...



Get Started Using the Exploit Prediction Scoring System (EPSS).

Cyentia Institute’s Chief Data Scientist and Founder Jay Jacobs gives tips on how to get started using the Exploit Prediction Scoring System (EPSS). You...

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.