Case Studies
Data Sheets
Solution Briefs
White Papers

Data-driven Insights from the Equifax Breach: How to Protect Your Enterprise

Could your organization be taken by surprise and…View >

GDPR & Cyber Threat Forecasting: How to Predict and Prevent Attacks

When GDPR comes into force in May 2018,…View >

How WilmerHale Built a More Efficient and Effective Vulnerability Management Model with Kenna Security

Headquartered in Washington, D.C. WilmerHale provides legal representation…View >

How to Implement a Risk-based Approach to Vulnerability Management

According to the Identity Theft Resource Center (ITRC),…View >

Solution Brief – The Kenna Security Platform

No one wants their company to be the…View >

SOAPA Interview With Kenna Security (Part 2)

In part two of  Kenna Security CEO Karim…View >

SOAPA Interview with Kenna Security (Part 1)

Karim Toubba, CEO of Kenna Security, discusses SOAPA…View >

How to Measure, Report On and Actually Reduce Vulnerability Risk

A solid vulnerability management program is critical for…View >

Adopting a Risk-Based Approach to Vulnerability Management at TransUnion

Managing cyber risk can’t be done effectively in…View >

Close What Matters: 5 Requirements for Reducing Vulnerability Risk

It only takes one exploited vulnerability to bring…View >

The Kenna Security Platform Data Sheet

The Kenna Security Platform is a scalable, cloud-based…View >