Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

Benefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability Management

Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL. Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on identifying and prioritizing vulnerabilities based on the potential risk they pose to an organization. This approach builds upon traditional vulnerability management, which often involves scanning for and patching all vulnerabilities without considering their actual impact on the business. In RBVM, vulnerabilities are evaluated based on factors like the criticality…

Read More

Meet the Cisco Security Risk Score (formerly Kenna Risk Score)

Meet the Cisco Security Risk Score (formerly Kenna Risk Score)

In April 2023, we rebranded our risk-based vulnerability management solution, Kenna.VM, to Cisco Vulnerability Management. Today, we are excited to share another milestone in our journey. Effective immediately, the Kenna Risk Score is renamed to the Cisco Security Risk Score. Additionally, Kenna.VI (and Kenna.VI+) is renamed to Cisco Vulnerability Intelligence, and Kenna.AppSec is renamed to Application Security module. Cisco Security Risk Score To strengthen cohesion with the Cisco brand and enhance the user experience, the…

Read More

Cisco Vulnerability Management Named a Leader in Omdia Universe: RBVM Solutions, 2023

Cisco Vulnerability Management Named a Leader in Omdia Universe: RBVM Solutions, 2023

Omdia released its 2023 Omdia Universe: Risk-Based Vulnerability Management Solutions report, and we’re excited to say that Cisco Vulnerability Management (formerly Kenna.VM) is recognized as a Leader! Risk-based Vulnerability Management (RBVM) builds upon the legacy vulnerability management market with stronger vulnerability prioritization and response. RBVM tackles the problem of determining which vulnerabilities pose a real risk in your environment and need to be patched versus which vulnerabilities you can safely de-prioritize. Improving the efficiency and…

Read More