Kenna Security is now part of Cisco

|Learn more
Contact Us
Talk to an Expert
Request a demo

Research Reports

Cutting-edge research on vulnerability management.

P2P Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.
Download Now
Kenna API

How to Work with Custom Fields: Part Two

Part Two of the API Guy's discussion focuses on vulnerability metadata .
READ MORE
Webinars

Posture Perfect: 5 Tips for Straightening up Your Vulnerability Management Program

Recent survey findings reveal promising strategies for teams looking to straighten up their security posture.
REGISTER NOW
Industry

From Gartner, a Future Defined by Risk and Resilience 

The Gartner Security & Risk Management Summit in Sydney revealed eight predictions made by leading cybersecurity experts.
READ MORE
Industry

Why CISA’s Directive 22–01 Is Only Half the Equation

CISA’s directive reflects a larger shift in the security industry towards risk-based vulnerability management.
READ MORE
Industry

5 Critical Take-Aways from ESG’s Cybersecurity Survey

"Security Hygiene and Posture Management," released in October, outlines key concerns and motivators across multiple security dimensions.
READ MORE
Industry

It’s Past Time to Secure Your Supply Chain

Modern supply chains, held together by a series of trusted relationships and digital handshakes, can be massively complex and difficult for cybersecurity...
READ MORE

How to Implement Risk-Based Vulnerability Management Now: A Practical Guide

Download the guide and discover why traditional ways of vulnerability management no longer work and how focusing on risk is the key to remediating the vulnerabilities that matter most.

FacebookLinkedInTwitterYouTube

© 2022 Kenna Security. All Rights Reserved. Privacy Policy.