Hi [[ session.user.profile.firstName ]]

Kenna Security

  • Date
  • Rating
  • Views
  • Kenna Platform Demo: Your Risk Revealed Kenna Platform Demo: Your Risk Revealed Kenna Security Recorded: Dec 30 2015 25 mins
    Join Brian Kavanagh and Kyle Havens as they offer a fast but detailed tour of the platform. See how Kenna has become an indispensable part of the security arsenal at companies such as PTC, Anthem, Hanesbrands, and Metlife.

    In just 30 minutes, we'll cover how to:
    - Connect all your scanner feeds to the Kenna platform
    - Set up your risk meter dashboards for your technology environments
    - View, track, and report on your risk posture
    - See which patches give you the biggest bang for your buck
  • Introduction to Kenna Security: How it Works Introduction to Kenna Security: How it Works Kenna Security Recorded: Oct 20 2015 2 mins
    Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization's weaknesses. Kenna accomplishes this by automating the correlation of customer vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches. For more information, visit kennasecurity.com
  • CVSS Under Fire: How to Solve The Prioritization Problem CVSS Under Fire: How to Solve The Prioritization Problem Michael Roytman, Chief Data Scientist at Kenna Recorded: Aug 26 2015 43 mins
    In the landscape of vulnerability management, you know that effective prioritization of vulnerabilities is the difference between "playing the numbers game" and truly being an InfoSec rock star. But too often, our primary resource--the CVSS--is relied on too heavily, with disastrous consequences.

    Michael Roytman, Chief Data Scientist at Kenna, will explain what IT security professionals miss by placing too much trust in CVSS when it comes to prioritization efforts. He will also explain what information should absolutely be taken into consideration in order to focus on vulnerabilities posing the greatest risk. Topics covered include:

    - Why CVSS sometimes gets it wrong
    - Specific examples of serious exploits being given low scores
    - What IT security professionals should do to supplement CVSS
    - How the proper use of threat intelligence can accelerate your vuln management program

Embed in website or blog