Author Archives: Ed Bellis

Ed Bellis

About Ed Bellis

Ed is the CTO and a Cofounder of Kenna.

Introducing….Benchmarking!

Ed Bellis    September 19, 2011

We have made some new and important additions to our Risk I/O dashboard recently. In addition to “out of the box” vulnerability metrics, we have begun the rollout of our benchmarking tab. This tab allows you to compare your metrics and statistics against your peers across the industry in order to gauge your overall vulnerability management performance. We have started… Read more »

Rapid 7 – We Are In You

Ed Bellis    August 31, 2011

We have been crazy busy here building out additional connectors and enterprise features into Risk I/O, but wanted to take two minutes to stop and let everyone know about our newest connector. We are very excited to welcome our newest vulnerability assessment connector into the Risk I/O family – Rapid7’s NeXpose Enterprise. We wanted to thank the Rapid7 team for… Read more »

Vulnerability Assessment Data Analysis

Ed Bellis    August 29, 2011

A couple of weeks ago we asked you to help us build our roadmap by completing a short survey. We wanted to ensure we were integrating with the vulnerability assessment and remediation tools that were most valuable to our audience. I initially thought we would be able to pull this information from the analysts but had very little luck with… Read more »

Help Us Build our Roadmap for a Chance at a Free 1-Year Subscription!

Ed Bellis    August 15, 2011

Let’s face it, the greatest value that Risk I/O delivers is the ability to connect into your vulnerability assessment tools so that you can easily manage and monitor all of security vulnerabilities and defects. We believe that the assessment tools, static and binary analysis tools, trouble ticketing and bug-tracking tools that Risk I/O is compatible with should align as closely… Read more »

Establishing Criteria for Vulnerability Management Solutions

Ed Bellis    August 8, 2011

Over the past several months, we have engaged with many organizations that are considering automating their vulnerability management programs.  Because many already have manual processes in place to manage their vulnerability data, they’ve been able to provide us with a tremendous amount of insight as to what functionality they deem most important in migrating to an automated vulnerability management system.Through… Read more »

The Vulnerability Arms Race

Ed Bellis    May 13, 2011

Note: This is a repost from my CSO Online blog. If you are working in an organization with any sizable technology infrastructure, it has probably become quite apparent that your vulnerability management program has a lot more “vulnerabilities” than “management”. I recently had an email exchange with Gene Kim, CTO at Tripwire, regarding this issue and he boiled it down… Read more »