Kenna & VMware Carbon Black Collaborate  
Learn More >
Contact Us
Talk to an Expert
Request a demo

Research Reports

Cutting-edge research on vulnerability management.

P2P Volume 5: In Search of Assets at Risk

The fifth volume of the Prioritization to Prediction series produced in conjunction with the Cyentia Institute explores the vulnerability risk landscape by looking at how enterprises often view vulnerabilities: through the lens of common asset platforms.
Download Now
Get the latest updates

Measuring What Matters with Cyentia Institute

We discuss the fourth report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 4: Measuring What Matters In Remediation.

Vulnerability Remediation

What is Vulnerability Remediation? Here’s a Primer

Vulnerability remediation is the patching or fixing of cybersecurity weaknesses that are detected in enterprise assets, networks and applications. Formerly a manual process, vulnerability remediation today is more automated, with advanced data science, threat intelligence, and predictive algorithms helping to determine which vulnerabilities should be remediated first.  Taking a risk-based approach helps IT and DevOps…


Boost Web Vulnerability Management with Prioritization and Visibility

Maximize Your Web Security Manual processes and standalone tools are no longer enough to build and maintain a consistent security program. When you add the growing cybersecurity skills gap into the picture, it is clear that security partnerships are now vitally important. In this webinar, you will learn how to optimize web vulnerability management with…

Vulnerability Management

11 Tips for Choosing a Vulnerability Management Solution

“These tips go to 11.” – Nigel Tufnel It can be daunting to choose between vulnerability management (VM) solutions when all vendors describe their offerings in very similar ways. So making the best choice for you means identifying what your organization needs, and ensuring the solutions you’re evaluating meet those needs. It’s safe to say…

Employee Spotlight

Employee Spotlight – Moscow Mule with Mylo Reyes

When opportunity knocks, Mylo Reyes answers the door. Mylo, a talented UX Designer, is an active participant in many aspects of life here at Kenna Security. You’ll find his good humor and thoughtful insight pop up in many places, including the company’s BIPOC Diversity and Inclusion group. Mylo seems to be equal parts intelligent, passionate,…


Reporting Risk To The Board

We discuss the evolution of cybersecurity metrics and reporting to Boards of Directors.


How to Implement Risk-Based Vulnerability Management Now: A Practical Guide

Download the guide and discover why traditional ways of vulnerability management no longer work and how focusing on risk is the key to remediating the vulnerabilities that matter most.

Threat Intelligence

15+ Threat Intel Feeds Power Modern Vulnerability Management

One question we often get from customers or prospective clients is why we use 15+ threat and exploit intelligence feeds? Seems excessive, right? Why not just 4 or 5 feeds? Or 10? Why do we use more than 15 threat and exploit intelligence feeds to power the Kenna.VM modern vulnerability management platform?  The answer is…


Winning The Remediation Race with Cyentia Institute

We discuss the third report in our multi-part dive into the Prioritization to Prediction research series by Kenna Security and The Cyentia Institute. Prioritization to Prediction volume 3: Winning the Remediation Race looks at (1) how quickly and (2) how many vulnerabilities a given organization can handle. Answering two key questions: Can organizations remediate all…

Risk-Based Vulnerability Management

Kenna Security and VMware Carbon Black Collaborate to Provide Risk Prioritization to Cloud Workloads

The challenge of cloud-based applications is that workloads may move through several different environments that can be owned and operated by vendors with different technology. With the cloud there are no well-defined boundaries. VMware Carbon Black Cloud Workload is a product that has been designed from the ground up to protect cloud workloads that operate…

Vulnerability Management

Key Take-Aways for IT from the Latest Vulnerability Management Research

In some ways, IT is in a tough spot when it comes to reducing cyber risk. IT teams are usually responsible for remediating vulnerabilities within various asset groups. But even though IT groups ultimately own assets, they often don’t have full control over which assets end up where. End-user devices, for instance, have a tendency…


Around the Virtual Table with Chris, Jeremiah & Ed

Today on Security Science, we have a special around the virtual table with some of the biggest names in cybersecurity discussing a wide range of topics like the securing remote worker, whether companies really moving to the cloud, and the impact of the 2020 presidential election.

Vulnerability Management

Digging Deeper on Vulnerability Management: Why Do Some Industries Fare Better Than Others?

When it comes to cybersecurity, there’s a lot of conventional wisdom.  Finance companies have a big target on their backs. Tech companies have the skills to get the job done. Manufacturing firms are insulated from danger with lots of custom and rare applications that few hackers would bother to develop exploits for. And the healthcare…

Sign up for a Free Trial

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.