Kenna Security is now part of Cisco

|Learn more

Research Reports

Cutting-edge research on vulnerability management

P2P Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.
Download Now
Research

Posture Perfect: 5 Tips for Straightening up Your Vulnerability Management Program

Recent survey findings reveal promising strategies for teams looking to straighten up their security posture.
READ MORE
Research

Supply Chain Security 101: Understanding Your Supply Chain and Your Risks

"Supply chain security” may be the latest buzzword but few know what it really means or how to approach it. Get expert insight into understanding your...
READ MORE
Research

How Improving Security Resilience Reduces Business Risk

Enterprise leaders are recognizing that security resilience reinforces business resilience and lowers overall risk, but the road to a resilient future...
READ MORE
Research

8 Biggest VM Implementation Pitfalls (And How to Avoid Them)

We’ve assembled an all-star lineup to unpack the biggest missteps facing RBVM implementations—and the best ways to maximize ROI and lower risk.
READ MORE
eBooks

Buy vs. Build? 5 Considerations for Vulnerability Management

Download an eBook to help determine when to buy, when to build, or when to do both when it comes to employing a vulnerability management program that...
DOWNLOAD NOW
eBooks

How to Build a Modern VM Program in 6 Steps

A buyer's guide that walks prospects through the 6 steps needed to implement a risk-based vulnerability management program.
DOWNLOAD NOW

How to Implement Risk-Based Vulnerability Management Now: A Practical Guide

Download the guide and discover why traditional ways of vulnerability management no longer work and how focusing on risk is the key to remediating the vulnerabilities that matter most.

FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.