Author Archives: jheuer

jheuer

About jheuer

Jeff is Chief of Design and a Cofounder at Kenna.

Vulnerability Threat Management 2.0

jheuer    February 20, 2014

When it comes to managing your IT environment, there is often just too much to look at. As our Data Scientist Michael Roytman mentioned in his recent research paper, the biggest challenge isn’t finding security defects, but rather managing the mountain of data produced by security tools in order to fix what’s most important first. Well our latest version of… Read more »

Introducing Real-Time Attack Data to Risk I/O

jheuer    June 19, 2013

Today we are announcing the addition of real-time attack data to our Risk I/O vulnerability intelligence platform. With this addition, our vulnerability intelligence platform now offers smarter priority sorting based on real world data, giving insight into where attacks are most likely to occur. Using a processing engine, Risk I/O correlates live attack data from multiple sources, and prioritizes vulnerabilities… Read more »

Risk I/O’s Vulnerability SmartSearch Is Now Even Smarter

jheuer    May 8, 2013

Our SmartSearch feature has gotten, well, even smarter. You already know that with SmartSearch you can choose many fields from many criteria at once, enabling you to filter down to only the vulnerabilities or assets you need. Well now you can save the SmartSearch(es) you perform on your vulnerabilities and assets in Risk I/O for reference later. Saving a vulnerability… Read more »

Introducing RiskDB

jheuer    December 4, 2012

Today we’re launching RiskDB, a free, centralized, and open repository of vulnerabilities sourced from public databases. It provides up-to-the-minute information on security-related software flaws, misconfigurations, and threat advisories. We think RiskDB will be one of the easiest ways to stay on top of vulnerabilities relevant to the infrastructure you’re responsible for. For a quick search, just enter your query in the… Read more »

Power Search Your Way Through the Vulnerability Haystack

jheuer    August 22, 2011

We’re pleased to announce a powerful new vulnerability search architecture for Risk I/O! Users can now search and filter their vulnerabilities more easily than ever before. The heart of this new functionality is a set of filters that can be mixed-and-matched to generate the specific query that meets your needs. Individual filters can be expanded to view their possible values,… Read more »