Kenna Security
Cisco to acquire Kenna Security to help customers improve their security posture
Kenna’s risk-based vulnerability management technology enables organizations to work cross-functionally to rapidly identify, prioritize and remediate cyber risks. With this …
When exploit code precedes a patch, attackers gain a massive head start
Cybersecurity researchers that publicize exploit code used in cyberattacks are giving a clear and unequivocal advantage to attackers, new research conducted by Kenna Security …
Risk-based vulnerability management has produced demonstrable results
Several years ago, risk-based cybersecurity was a largely untested and hotly debated topic. But the tests have since been administered and the debate largely settled: …
Having a cybersecurity training program in place isn’t enough to ensure cyber safety
With cyberattacks increasing dramatically after the pandemic, TalentLMS and Kenna Security teamed up to gauge employees’ awareness and knowledge of cybersecurity risks. While …
The effectiveness of vulnerability disclosure and exploit development
New research into what happens after a new software vulnerability is discovered provides an unprecedented window into the outcomes and effectiveness of responsible …
Kenna Security provides a faster and more accurate way to gauge the risk of specific vulnerabilities
Kenna Security, the enterprise leader in risk-based vulnerability management, announces the Exploit Prediction Scoring System (EPSS), a free, open model that uses 16 variables …
Kenna Security raises $48M to accelerate its international expansion and drive further innovation
Kenna Security, the enterprise leader in risk-based vulnerability management, announced a $48 million series D funding round that adds Sorenson Capital and Citi Ventures as …
Should enterprises delay efforts to remediate most vulnerabilities?
Companies today appear to have the resources needed to address all of their high-risk vulnerabilities. The research demonstrates that companies are getting smarter in how they …
Equifax: A study in accountability but not authority responsibility
Like most of the security community, I have spent hours digesting the recently released U.S. House of Representatives Committee on Oversight and Government Reform report on …
New infosec products of the week: February 2, 2018
Stop threats in enterprise container runtime environments StackRox announced StackRox Detect and Respond 2.0, enhancing its robust threat detection capabilities across five …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments