Contact Us
Talk to an Expert
Request a demo

Research Reports

Cutting-edge research on vulnerability management.

P2P Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.
Download Now
Risk-Based Vulnerability Management

How to Measure Vendor Performance and Effectiveness

To measure vendor performance and effectiveness, CISOs need to get Informed, evaluate, and compare RBVM programs.
READ MORE
Podcast

Security Science Podcast Episode 13: Measuring and Minimizing Exploitability

Security Science episode 13 highlights Prioritization to Prediction, Volume 8: Minimizing and Measuring Exploitability.
READ MORE
Uncategorized

Managing Assets Intuitively with Hierarchical Risk Meters

This article guides Kenna customers on how to build out a robust hierarchical risk meter structure for quick, easy reporting of risk levels.
READ MORE
Research

Here’s How to Measure Your Organization’s Exploitability

The eighth edition of the Prioritization to Prediction series uncovers how to measure and reduce exploitability.
READ MORE
Research Reports

Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability

Prioritization to Prediction Volume 8: Measuring and Minimizing Exploitability reveals that exploitability can, in fact, be measured. And accurately...
DOWNLOAD NOW
Research

Gartner identifies VPT as a critical tool for your security arsenal

The latest Gartner Market Guide for Vulnerability Assessment traces the latest trajectory of cybersecurity vendor offerings.
READ MORE

How to Implement Risk-Based Vulnerability Management Now: A Practical Guide

Download the guide and discover why traditional ways of vulnerability management no longer work and how focusing on risk is the key to remediating the vulnerabilities that matter most.

FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.