Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Frustrated by jumping back and forth between tools to try to understand your organization’s vulnerability exposure across both your containerized workloads and your traditional IT assets? Cisco Vulnerability Management (FKA Kenna Security) and Cisco...
Cisco Vulnerability Management’s new InsightVM connector provides many benefits over the Nexpose XML and API connectors, but if you are currently using one of the Nexpose connectors then you’ll need to complete a migration of connectors to ensure th...
If you are losing access to your Cisco Vulnerability Management environment but want to retain your historical data there are a few steps you can take to export your data from the platform.
First off, we recommend performing a full export of your as...
Prisma Cloud has three different fields that identify images in their platform.
Image ID - Base image ID that can be duplicated for multiples images if they are built off the same original base image.
Digest ID - SHA that's guaranteed to be uniq...
As customers' Cisco Vulnerability Management deployments grow and mature, their risk-meter collection is sure to explode in quantity and complexity. In addition to causing UI clutter, an excessive number of risk meters also leads to administrative...
This is great, thank you Rick. This reminds me of the flexibility of Kenna's API. While there may not be a specific endpoint to get this data, it's easy to collect with a little bit of creativity with Kenna's filtering ability. Always nice to have a ...