Category Archives: Uncategorized

We are a 2017-18 Cloud Awards Program Finalist for Security Innovation of the Year

Chloe Messdaghi    December 20, 2017

We’ve been named as a finalist in the 2017-2018 Cloud Awards Program for its entry in the Security Innovation of the Year category! The cloud computing awards program celebrates excellence and innovation in the rapid-growth cloud computing market. The awarding body accepts applications worldwide, covering the US, Canada, Australasia and EMEA. Organizations of any size are accepted for consideration in… Read more »

Kenna Security and ReversingLabs Partner to Identify and Prevent Malware Threats

Chloe Messdaghi    December 13, 2017

Today, we are pleased to announce our results from our partnership with ReversingLabs, a leading provider of threat intelligence solutions that accelerate and broaden an organization’s ability to detect threats, respond to incidents, and gain visibility into advanced attacks. The technology partnership integrates ReversingLabs’ real-time malware threat intelligence into the Kenna Security Platform. Kenna Security customers benefit from: The ability… Read more »

Nonprofits Cannot Ignore CyberSecurity

Chloe Messdaghi    October 26, 2017

Prior to joining Kenna Security, I worked with a number of nonprofits around the world. Each focused on providing shelter, education, health services, and food to children in need. The mission was clear and critical. Executing that mission wasn’t so easy. Nonprofits run on donated money. Though our goal was to save children, the strategy to drive the mission forward… Read more »

Equifax Lessons: Risk Hunting at Scale

Michael Roytman    September 15, 2017

This past week has seen another high profile breach in the news, one of the largest ever, and apparently the result of a known vulnerability.  Looking back at our analysis of the WannaCry attacks, we examined what we could  learn about prioritization from our 1 billion vulnerabilities under management. Out of those billion vulnerabilities, 259,451,953 were CVSS score of 9… Read more »

Treating the Root Cause: Security in Healthcare

Michael Roytman    August 29, 2017

Treating the Root Cause: Security in Healthcare Security is healthcare, and it’s apparent even in the language we use to describe malicious software. Viruses, worms and the like have long been examples of malware so-called because they propagate as disease, but more relevantly to us – they are also treated as such. Symptomatic treatment is any medical therapy of a… Read more »

August 24th – Kenna Platform Demo

Chloe Messdaghi    August 15, 2017

Wish you weren’t overwhelmed by a metric ton of vulnerabilities? Wish you had a better way to understand your company’s exposure to risk? In 30 minutes, discover how the Kenna platform grants those wishes, and more. During the demo, we will cover: How Kenna’s algorithm works to correlate scan data with real-world exploit intelligence How to get started with a Kenna… Read more »

Creating Risk Management Metrics that Matter

Ed Bellis    March 10, 2017

As a security team, you are what you measure. The problem is that too many security teams are tracking vulnerabilities, not measuring risk. This post examines how vital it is for security teams to establish risk-based metrics, offering examples of both the right and wrong measures to use. The paper then looks at the key steps to building risk management… Read more »

Introducing Easy, Accessible, Relevant 0-Day Data — via Exodus

Greg Howard    February 7, 2017

We’re thrilled to announce the go-live of our partnership with Exodus, giving us the ability to offer our customers premium access to 0-day data. Many of our customers have sophisticated vulnerability management programs, and they care a great deal about fortifying their efforts with zero-day intelligence. However, zero-day information is extraordinarily difficult to integrate with internal assets and meta data,… Read more »

New Zero-Day Exploit Intelligence – Introducing Exodus

Greg Howard    August 1, 2016

One of Kenna’s primary differentiators is its use of external exploit intelligence. It’s that real-time context, informed by Kenna’s own proprietary, patented algorithm, which makes our customers’ vulnerability scan data tell a story. We’re able to provide a “headline news” of what’s happening in our customer’s environments and what threats they need to remediate quickly. (And by the way, when… Read more »

The 2016 DBIR

Karim Toubba    May 11, 2016

This month Kenna Security participated in the Verizon data breach report, and for the second year running we used our data to drive the perspective of the vulnerability section. Since then there have been some questions and criticisms of a specific subset of the data referenced in a footnote in the vulnerability section – namely the top 10 vulnerability list…. Read more »