Tag Archives: cyber attacks

Talking Big Data & Cyber Risk Intelligence at Cybertech Tel Aviv 2018

Sam Osborn    January 25, 2018

2017 was the year that cybersecurity became front page news. High profile attacks such as NotPetya and WannaCry served as blaring wake up calls, heralding a new wave of cyber threats with ever more devastating consequences for the businesses affected. These attacks are, unfortunately, part of a trend rather than isolated instances. Breaches are becoming increasingly pervasive, with Gemalto’s Breach… Read more »

Nonprofits Cannot Ignore CyberSecurity

Chloe Messdaghi    October 26, 2017

Prior to joining Kenna Security, I worked with a number of nonprofits around the world. Each focused on providing shelter, education, health services, and food to children in need. The mission was clear and critical. Executing that mission wasn’t so easy. Nonprofits run on donated money. Though our goal was to save children, the strategy to drive the mission forward… Read more »

Equifax Lessons: Risk Hunting at Scale

Michael Roytman    September 15, 2017

This past week has seen another high profile breach in the news, one of the largest ever, and apparently the result of a known vulnerability.  Looking back at our analysis of the WannaCry attacks, we examined what we could  learn about prioritization from our 1 billion vulnerabilities under management. Out of those billion vulnerabilities, 259,451,953 were CVSS score of 9… Read more »

A Wannacry Post That Doesn’t Make Me Want To Cry

Ed Bellis    May 17, 2017

OK, admittedly, I am the last one who wanted to write Yet Another Post About WannaCry. There’s a ton of noise out there about the topic, both good and bad. As a CISO, I loathed all the “me too” coverage and “if you just bought our product you’d be safe” pitches following big security incidents. But this isn’t that post…… Read more »

The 2016 DBIR

Karim Toubba    May 11, 2016

This month Kenna Security participated in the Verizon data breach report, and for the second year running we used our data to drive the perspective of the vulnerability section. Since then there have been some questions and criticisms of a specific subset of the data referenced in a footnote in the vulnerability section – namely the top 10 vulnerability list…. Read more »

Introducing Real-Time Attack Data to Risk I/O

jheuer    June 19, 2013

Today we are announcing the addition of real-time attack data to our Risk I/O vulnerability intelligence platform. With this addition, our vulnerability intelligence platform now offers smarter priority sorting based on real world data, giving insight into where attacks are most likely to occur. Using a processing engine, Risk I/O correlates live attack data from multiple sources, and prioritizes vulnerabilities… Read more »

The Transformation of Cyber Attacks

Jacques Benkoski    March 26, 2013

This is a guest blog post by Jacques Benkoski, Risk I/O investor and Board member. A complete, global transformation of the landscape in the security software domain is underway. Countless articles have been written about how we have moved beyond the casual attacker cooking a virus for fun and/or profit to something completely different and far more dangerous to the… Read more »