FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Trends & Insights
Bookmark
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
12 minute read
Artificial Intelligence
Bookmark
What You Need To Know About The EU AI Act
11 minute read
Artificial Intelligence
Bookmark
AI Solutions Risk Gap: A Better Way To Think About AI Risk
7 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
XDR Vs MDR Vs EDR
Bookmark
XDR vs MDR vs EDR: What’s the Difference?
5 minute read
XDR vs SIEM vs SOAR
Bookmark
What’s the Difference Between SIEM, XDR and SOAR?
5 minute read
Next-Generation EDR
Bookmark
Next Generation EDR: How to Maximize its Value
5 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
Board Communication
Bookmark
The ModernCISO Minute: Board Communication
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
ModernCISO Basics
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Subscribe
Favorite posts
Search posts on the site:
Filter by
Topic
Advisory
Advisory Services
Blockchain
CISO
Cloud
Incident Response
MDR vs XDR
Microsoft Security
Network Security
Next-Generation EDR
operational technology
OT Security
Pentesting
Quantum Computing
Risk Management
What Is XDR
XDR Vs MDR Vs EDR
XDR vs SIEM vs SOAR
Zero Trust
Filter by
Author
Chris Goosen
Christina Anderson
Gijs Van Den Elshout
Johann Paimboin
Kudelski Security Team
Lonny Brissac
Ron Frederick
Tommaso Gagliardoni
Vincent Waart
ModernCISO Basics
Not-so-basic breakdowns of what people are talking about in the cybersecurity industry today.
XDR Vs MDR Vs EDR
XDR vs MDR vs EDR: What’s the Difference?
Does your organization have adequate protection against cybersecurity attacks? As the threats from hackers evolve – increasing in sophistication, volume, and speed – so must your security solutions and strategy. Any discussion on solutions for identifying and dealing with threats and attacks features three topics: Endpoint Detection and Response (EDR) Extended Detection and Response (XDR)
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
XDR vs SIEM vs SOAR
What’s the Difference Between SIEM, XDR and SOAR?
When it comes to cybersecurity, there are a lot of acronyms you might come across. EDR, NAC, ZTNA, DLP—the list goes on. However, some will be much more critical to your business than others, and in this blog, we’re going to take a closer look at the difference between SIEM and XDR, as well as
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Next-Generation EDR
Next Generation EDR: How to Maximize its Value
For many years, Endpoint Detection and Response (EDR) solutions were considered to be the foundation of an effective cybersecurity strategy. On one level, this makes total sense. Afterall, it’s estimated that endpoints—physical devices connected to a network—are the starting point for and 70% of successful data breaches. Protecting these elements of your network is critical
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
MDR vs XDR
MDR vs XDR: Everything You Need to Know
Extended Detection and Response (XDR) is a popular topic in the cybersecurity sector right now. Cynics may say that Sales will put an X in front of anything to try and give it the edge. But in this case, X really does stand for ‘eXtended’, so it’s there for good reason. XDR is a platform
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
What Is XDR
Everything You Need To Know About XDR
As digital infrastructure becomes the backbone of modern business, the sophistication and frequency of cyber threats have escalated, making advanced security measures a necessity. These digital infrastructures and remote working trends have expanded the cybersecurity perimeter, creating a wider attacker surface and introducing new risks and vulnerabilities that organizations need to manage As threats evolve
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
Drawn by their convenience, scalability, and cost-effectiveness, today’s businesses are taking advantage of Software-as-a-Service (SaaS) applications more and more often. The global SaaS market is forecast to see an impressive 18% compound annual growth rate over the next four years, with more than 99% of organizations already relying on at least one SaaS app to
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
operational technology
Make Buildings Work Smarter, Not Harder
A typical office environment looks significantly different from a few years ago (and no, this is not another “effects of the pandemic” story). In this case the difference-maker is building automation, which has become more widely embraced for managing commercial buildings as organizations and property owners realize the benefits of centrally controlling and managing independent
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Zero Trust
Why A New Approach to Zero Trust Architecture Matters to Your Networks
Zero Trust Starts with 100 Percent Mindset There’s nothing new to say when it comes to zero trust security, at least in terms of tactics. Many of the most commonly deployed methods have been around for decades: the least privilege principle, need-to-know access, firewalls, and VPNs. But if we’re talking about the concept of zero
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Dealing with a cyber-attack? Six common pitfalls companies should avoid when handling a security crisis
Managing a cyber crisis is one of the most challenging and stressful aspects of a CISO’s job. Aside from the actual challenge and stress of trying to handle a security incident and help your business successfully recover and rebound, far too many security leaders’ work is made exponentially worse by falling into a number of
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Is my company ready to handle a cyber-attack? Three tips for security leaders to best prepare for and mitigate ongoing security risks
It should be no secret by now that security threat actors constantly evolve their tactics to keep up with new security measures. This means that organizations also need to continually update their efforts to ensure a strong security posture to protect their assets. Especially since a crisis can arise at inopportune moments, such as in
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Is your business dealing with a cybersecurity attack? Here are the five most important steps security leaders and boards must take when dealing with a cyber-attack
As cyber-attacks continue to hit businesses of all sizes, we know that both CISOs and boards struggle during what is one of the most stressful situations they experience. While there’s no one-size-fits-all plan that addresses every organization and every kind of breach or attack they may face, any successful cybersecurity incident response effort requires planning,
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Pentesting
From Theory to Practice: Getting Started with Red Teaming
It seems like everyone is talking about red teaming these days and for good reason. Red teaming can be an incredibly useful exercise for organizations looking to test their threat detection and response capabilities as well as their security maturity as a whole. It’s an evolution of the traditional network pentest, but there are key
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It Cyber threat intelligence programs play a foundational role in protecting modern enterprises from cyberattacks, informing security priorities, data collection and decision making. This blog introduces some of the key concepts and how to get started with cyber threat intelligence. What
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Quantum Computing
Beginners Guide to Quantum Computing and the New IT Revolution
Quantum Computing is going to be the next IT revolution, and it’s going to be disruptive. At Kudelski Security, our focus is on helping clients prepare for the new era of quantum computing. These futuristic machines are on the way to being built right now, and they can crack open the most secure cryptographic codes
24 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: Answering the Most Challenging Board Questions
In the first part of this series, I introduced the research on CISO board communications and metrics Kudelski Security performed in collaboration with our Client Advisory Council. The report is available in full here. As with all meaty reports, there’s a lot of content. This article seeks to cover some interesting insight that didn’t make
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
1
2
next page