Kenna Security
Cisco to acquire Kenna Security to help customers improve their security posture
Kenna’s risk-based vulnerability management technology enables organizations to work cross-functionally to rapidly identify, prioritize and remediate cyber risks. With this …
When exploit code precedes a patch, attackers gain a massive head start
Cybersecurity researchers that publicize exploit code used in cyberattacks are giving a clear and unequivocal advantage to attackers, new research conducted by Kenna Security …
Risk-based vulnerability management has produced demonstrable results
Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: …
Having a cybersecurity training program in place isn’t enough to ensure cyber safety
With cyberattacks increasing dramatically after the pandemic, TalentLMS and Kenna Security teamed up to gauge employees’ awareness and knowledge of cybersecurity risks. While …
The effectiveness of vulnerability disclosure and exploit development
New research into what happens after a new software vulnerability is discovered provides an unprecedented window into the outcomes and effectiveness of responsible …
Kenna Security provides a faster and more accurate way to gauge the risk of specific vulnerabilities
Kenna Security, the enterprise leader in risk-based vulnerability management, announces the Exploit Prediction Scoring System (EPSS), a free, open model that uses 16 variables …
Kenna Security raises $48M to accelerate its international expansion and drive further innovation
Kenna Security, the enterprise leader in risk-based vulnerability management, announced a $48 million series D funding round that adds Sorenson Capital and Citi Ventures as …
Should enterprises delay efforts to remediate most vulnerabilities?
Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they …
Equifax: A study in accountability but not authority responsibility
Like most of the security community, I have spent hours digesting the recently released U.S. House of Representatives Committee on Oversight and Government Reform report on …
New infosec products of the week: February 2, 2018
Stop threats in enterprise container runtime environments StackRox announced StackRox Detect and Respond 2.0, enhancing its robust threat detection capabilities across five …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity