Nonprofits Cannot Ignore CyberSecurity

Chloe Messdaghi    October 26, 2017

Prior to joining Kenna Security, I worked with a number of nonprofits around the world. Each focused on providing shelter, education, health services, and food to children in need. The mission was clear and critical. Executing that mission wasn’t so easy. Nonprofits run on donated money. Though our goal was to save children, the strategy to drive the mission forward… Read more »

Equifax Lessons: Risk Hunting at Scale

Michael Roytman    September 15, 2017

This past week has seen another high profile breach in the news, one of the largest ever, and apparently the result of a known vulnerability.  Looking back at our analysis of the WannaCry attacks, we examined what we could  learn about prioritization from our 1 billion vulnerabilities under management. Out of those billion vulnerabilities, 259,451,953 were CVSS score of 9… Read more »

Treating the Root Cause: Security in Healthcare

Michael Roytman    August 29, 2017

Treating the Root Cause: Security in Healthcare Security is healthcare, and it’s apparent even in the language we use to describe malicious software. Viruses, worms and the like have long been examples of malware so-called because they propagate as disease, but more relevantly to us – they are also treated as such. Symptomatic treatment is any medical therapy of a… Read more »

August 24th – Kenna Platform Demo

Chloe Messdaghi    August 15, 2017

Wish you weren’t overwhelmed by a metric ton of vulnerabilities? Wish you had a better way to understand your company’s exposure to risk? In 30 minutes, discover how the Kenna platform grants those wishes, and more. During the demo, we will cover: How Kenna’s algorithm works to correlate scan data with real-world exploit intelligence How to get started with a Kenna… Read more »

Malware exploitable vulnerabilities – Addressing the root cause

Michael Roytman    July 24, 2017

Today, we’re excited to announce our partnership with ReversingLabs – a leader in the world of malware research and analysis. Using metadata about malware samples submitted to ReversingLabs, and focusing on the subset of malware for which we know the Exploit that was used, we can start to treat the root cause of the problem. This is done by notifying… Read more »

Introducing Easy, Accessible, Relevant 0-Day Data — via Exodus

Greg Howard    February 7, 2017

We’re thrilled to announce the go-live of our partnership with Exodus, giving us the ability to offer our customers premium access to 0-day data. Many of our customers have sophisticated vulnerability management programs, and they care a great deal about fortifying their efforts with zero-day intelligence. However, zero-day information is extraordinarily difficult to integrate with internal assets and meta data,… Read more »

Clash of the Titans: How InfoSec and Remediation Teams Can Finally Get Along

Ed Bellis    October 26, 2016

Why the bad blood between InfoSec and Remediation teams? The reality is, they need each other. They just don’t always work alongside each other, or use the same metrics, or see things the same way, or…well, let’s just say there’s a lot of baggage there. Why We Can’t All Just Get Along Within many organizations, security teams and remediation teams… Read more »