Ready to implement a Risk-Based Vulnerability Management approach?  
Download The Guide Now>
Contact Us
Talk to an Expert
Request a demo

Research Reports

Cutting-edge research on vulnerability management.

P2P Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.
Download Now
Get the latest updates
Vulnerability Management

Digging Deeper on Vulnerability Management: Why Do Some Industries Fare Better Than Others?

When it comes to cybersecurity, there’s a lot of conventional wisdom.  Finance companies have a big target on their backs. Tech companies have the skills to get the job done. Manufacturing firms are insulated from danger with lots of custom and rare applications that few hackers would bother to develop exploits for. And the healthcare…

READ MORE
Webinars

Inverting the Vulnerability Management Pyramid

Traditional vulnerability-centric models leave you trying to narrow down the 30,000 “critical” vulnerabilities your scanner finds into a list short enough for your remediation team to manage. It’s time-consuming and inefficient. Register Now

WATCH NOW
Research Reports

Vulnerability Remediation Performance Snapshot for the Manufacturing Sector

In order to accurately assess your organization’s performance it’s important to have a starting point. A good one is how your industry peers are doing. To give the manufacturing sector data points to assess their vulnerability management performance we teamed up with our research partner, the Cyentia Institute, to leverage sample data from approximately 40+…

DOWNLOAD NOW
Research Reports

Vulnerability Remediation Performance Snapshot for the Healthcare Sector

In order to accurately assess your organization’s performance it’s important to have a starting point. A good one is how your industry peers are doing. To give the healthcare sector data points to assess their vulnerability management performance we teamed up with our research partner, the Cyentia Institute, to leverage sample data from approximately 30…

DOWNLOAD NOW
Research Reports

Vulnerability Remediation Performance Snapshot for the Finance Sector

In order to accurately assess your organization’s performance it’s important to have a starting point. A good one is how your industry peers are doing. To give the financial sector data points to assess their vulnerability management performance we teamed up with our research partner, the Cyentia Institute, to leverage sample data from approximately 100…

DOWNLOAD NOW
Research Reports

Vulnerability Remediation Performance Snapshot for the Technology Sector

In order to accurately assess your organization’s performance it’s important to have a starting point. A good one is how your industry peers are doing. To give the technology sector data points to assess their vulnerability management performance we teamed up with our research partner, the Cyentia Institute, to leverage sample data from approximately 70…

DOWNLOAD NOW

How to Implement Risk-Based Vulnerability Management Now: A Practical Guide

Download the guide and discover why traditional ways of vulnerability management no longer work and how focusing on risk is the key to remediating the vulnerabilities that matter most.

Risk-Based Vulnerability Management

Vulnerability Management Maturity Part Four: First Came the Sprint, Now the Marathon.

So there you are, the head of a successful vulnerability management program that has driven your company’s risk scores to a level that is both manageable and acceptable.  It’s been smooth sailing for the past year, and the days of chaos are but a memory. And then all of the sudden, the risk score jumps. …

READ MORE
Podcast

The Exploit Prediction Scoring System (EPSS)

We discuss the Exploit Prediction Scoring System (EPSS), the first open, data-driven framework for assessing vulnerability threat: that is, the probability that a vulnerability will be exploited in the wild within the first twelve months after public disclosure.

READ MORE
Vulnerability Management

Risk-based SLAs 101

Earlier this year, my colleague Lindsey Compton, introduced the concept of risk-based service-level agreements (SLAs)—a new addition to Kenna.VM, our flagship risk-based vulnerability management solution. This is a first for our industry, so we’ve been engaging with customers and prospects on this new feature, answering any and all questions that pop up as folks get…

READ MORE
Podcast

Getting Real About Remediation with Cyentia Institute

We discuss the second report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction, Volume 2: Getting Real About Remediation picks up on the overall vulnerability landscape analysis from Volume 1 and dives deep into the vulnerability landscape from within actual enterprise networks…

READ MORE
Vulnerability Management

How to Build a Vulnerability Management Program

A vulnerability management program systematically identifies, evaluates, prioritizes, and mitigates vulnerabilities that can pose a risk to an enterprise’s infrastructure and applications. A modern vulnerability management program combines automation, threat intelligence, and data science to predict which vulnerabilities represent the greatest risk to a specific environment. Why is a vulnerability management program critical? The number…

READ MORE
Webinars

The Cloud Security Game Changer

Tune into Kenna Security’s webinar on Wednesday 14th October 2020, 10AM London to discuss how to gain new perspectives on how to evaluate cloud projects Register Now

WATCH NOW
Sign up for a Free Trial
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.