CISCO ANNOUNCES INTENT TO ACQUIRE KENNA SECURITY.  
Learn more.
Contact Us
Talk to an Expert
Request a demo

Research Reports

Cutting-edge research on vulnerability management.

P2P Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.
Download Now
Vulnerability Management

Endpoint Vulnerability Management in a Remote Workforce World

The great global remote workforce. What was initially a temporary solution to keep operations humming and ensure the safety of employees has evolved into a permanent state for many businesses and their employees. Prior to the arrival of the COVID-19 pandemic, a mere 17% of the nation’s workforce worked remotely five days or more per…

READ MORE
Industry

7 Questions to Ask Every Vulnerability Management Vendor

Vulnerability management is a wicked problem. And not in an endearing New England kind of way. “Wicked” is actually a recognized term describing how a problem shifts under your feet as you’re trying to solve it. In fact, the mere act of trying to solve it shifts the problem itself.  This makes vulnerability management a…

READ MORE
Cybersecurity Best Practices

5 Security Trends to Keep on Your Radar Right Now

As we approach the second half of 2021, more and more companies are finding their footing and settling into a new normal in a post-pandemic world. The operational upsets last year’s global pandemic introduced, including and especially remote work, have settled into a somewhat steady state. This has many business and security leaders looking ahead…

READ MORE
Webinars

Endpoint Vulnerability Management in a Remote Workforce World

Thousands of vulnerabilities are hiding in your environment—unpatched software, missing data encryption, malware, SQL injections, a bug-riddled file, the list goes on. And as remote work expands the boundaries of your environment, wrangling your highest-risk vulns (and your endpoints) becomes increasingly challenging.  Your new world problem demands a new world answer.  Kenna Security has partnered…

REGISTER NOW
Trending Vulns

June Vuln of the Month: CVE-2021-31166

Yesterday was Patch Tuesday, so it’s time for Exploit Wednesday—the day we publish our latest Vuln of the Month blog. This month’s vuln is a great example of why static vulnerability scores can get you into trouble, because some vulns are anything but static. June’s Vuln of the Month is CVE-2021-31166, a wormable Use After…

READ MORE
Customer

Where Are Customer Success Organizations Falling Short?

The biggest room in the world, the saying goes, is the room for improvement. Customer Success (CS) managers know all about this. Serving customers is a mercurial pursuit, and today’s challenges are likely to be very different from yesterday’s. In previous blogs, I’ve shared a range of best practices aimed at helping CS teams deliver…

READ MORE

How to Implement Risk-Based Vulnerability Management Now: A Practical Guide

Download the guide and discover why traditional ways of vulnerability management no longer work and how focusing on risk is the key to remediating the vulnerabilities that matter most.

Employee Spotlight

Employee Spotlight: Mojitos with Mike Sarazine

Ladies and gentlemen, introducing Kenna’s Salesperson of the Year: Mike Sarazine!  When Mike—Regional Sales Director for North Central—was awarded this incredible distinction at Kenna’s 2021 Sales Kickoff earlier this year, it came as no surprise. When Mike joined Kenna, he hit the ground running, and the impact of his professionalism and commitment could be felt…

READ MORE
Podcast

Establishing Defender Advantage with Cyentia Institute

We tackle a hotly contested debate as old as cybersecurity itself: does releasing exploit code do more harm than good?

READ MORE
Industry

Let’s Talk CVE Hyperinflation at VMware’s Security Connect 2021

If you’ve been following Kenna’s blogs you’ll know I’ve been tracking the publication of CVEs and sharing some key insights, including a recap of everything published in Q1 2021 (check out the podcast where I talk through it). We’ve seen some impressive figures. In Q1 of this year, more than 2,700 CVEs were published. That’s a…

READ MORE
Vulnerability Management

Learn the Difference Between CVE and CVSS, and What They Mean to You

CVE (Common Vulnerabilities or Exposures) refers to a list of publicly disclosed cybersecurity weaknesses, organized by identification numbers with descriptions and published dates. Many organizations prioritize CVEs using CVSS (Common Vulnerability Scoring System), a basic scoring framework that rates each CVE based on perceived severity. Understanding the difference between these terms is helpful to comprehend…

READ MORE
Podcast

How CIOs Get Things Done

We interview Collin Boyce, Chief Information Officer for the City of Tucson, Arizona and discuss his process of turning impossible ideas into real projects that achieve meaningful results.

READ MORE
Data Science

Coverage and Efficiency of Vulnerability Remediation 

In my previous blog, we talked about some buzzwords—terms like data science and machine learning that are regularly thrown around the buzzword bazaar. We were able to describe, at least at a high level, what we really mean when we talk about these terms here at Kenna.  Buzzwords are met with skepticism because they create…

READ MORE
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.