FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Trends & Insights
Bookmark
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
12 minute read
Artificial Intelligence
Bookmark
What You Need To Know About The EU AI Act
11 minute read
Artificial Intelligence
Bookmark
AI Solutions Risk Gap: A Better Way To Think About AI Risk
7 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
XDR Vs MDR Vs EDR
Bookmark
XDR vs MDR vs EDR: What’s the Difference?
5 minute read
XDR vs SIEM vs SOAR
Bookmark
What’s the Difference Between SIEM, XDR and SOAR?
5 minute read
Next-Generation EDR
Bookmark
Next Generation EDR: How to Maximize its Value
5 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
Board Communication
Bookmark
The ModernCISO Minute: Board Communication
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
Blogs
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Subscribe
Favorite posts
Search posts on the site:
Filter by
Topic
Advisory Services
Application Security
Artificial Intelligence
Black Hat
Blockchain
CISO
Cloud
Cloud Security
Cryptocurrency
Cybersecurity
Cybersecurity Trends
Incident Response
Managed Detection and Response
Microsoft Security
Operational Technology
Penetration Testing
Ransomware
Security Advisory
Trends & Insights
Zero Trust
Filter by
Author
Christina Anderson
Nathan Hamiel
Kudelski Security Team
Chris Goosen
Ron Frederick
Ernie Anderson
Zach Luze
Olivier Spielmann
Vincent Waart
Gijs Van Den Elshout
Felix Jaggi
Terry Vogelsang
Nathan Shock
Romain Aviolat
Jean-Sébastien Nahon
Blogs
A series exclusively authored by Kudelski Security’s experts, containing technical deep dives, the latest threat trends, articles on pentesting, OT, IR, MDR, and more.
Trends & Insights
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
This briefing highlights the most important findings from our 2024 Cybersecurity Trends and Insight report, including perspectives on the current state of cybersecurity, how trends will play out, and how organizations can address evolving risk, you can download the 2024 Cybersecurity Trends and Actionable Insights here. The field of cybersecurity is undergoing rapid change. Methods
12 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
What You Need To Know About The EU AI Act
As AI systems increasingly touch upon every aspect of our lives, the European Union (EU) seeks to mitigate the risks associated with its rapid adoption through clear, risk-based regulations. On December 9th, 2023, the EU Parliament and the Council reached a provisional agreement on the AI Act to safeguard EU citizens' rights and safety. With
11 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
AI Solutions Risk Gap: A Better Way To Think About AI Risk
AI risk is a hot topic. With conversations focused on p(doom) or X-Risk (Existential Risk) made against the backdrop of relentless hype, it can be hard to make sense of the real risk posed by applying AI technology to a system today. I can assure you that ChatGPT isn’t going to magically sprout consciousness and
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
Firewalling Large Language Models with Llama Guard
Intro Meta came with this nice Christmas gift for the AI community last December and I couldn't resist to give it a try. Dubbed Llama Guard, this project helps mitigate prompt injection vulnerabilities by sanitizing Large Language Model's (LLM) input and output against a pre-defined set of rules. While not being the first and only
10 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud
Pushing Security to the Edge – What is Edge Security
Pushing Security to the Edge It’s a fairly simple equation. The rise in remote workers generates a rise in traffic on corporate networks from different locations, which in turn generates the need to rethink network security strategies. Enter “Secure Access Service Edge” (SASE), a security design methodology and networking model proposed by the analyst and
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Advisory Services
Vulnerability Management: Common Mistakes and Misconceptions
This post summarizes a recent webinar “Is Everyone Doing Vulnerability Management Wrong?”, where vulnerability management advisors share common mistakes they’ve seen and offer practical advice for building a risk-based vulnerability management program. Is everyone doing vulnerability management wrong? For most of the industry, vulnerability management is, and will likely always be, a work in
9 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
The Trouble with Cybersecurity Awareness Month…
October was Cybersecurity Awareness Month, so, not surprisingly, we see a lot of media coverage about cybersecurity and hear about our clients’ cybersecurity teams focusing on the implementation of best practices. But as October moves to November, the emphasis on awareness gets pushed aside. Just when a company thinks it is making good progress on
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Zero Trust
Can Zero Trust Be A Business Enabler? It’s All About Perception
It was back in 2017 that the Economist predicted data would replace crude oil as the world’s most valuable resource and that there would be a new “asset-light” economy built on digital rather than physical infrastructures. In hindsight, we could say, yes, of course, that’s the case. We know the value of data and those
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Security Advisory
How to Integrate Red Teaming in Your Security Program
Introduction – What Red Teaming Is and Why You Should Care As a CISO, you have to ensure your organization's data and infrastructure are as secure as possible against cyber threats and that you are as prepared as possible to respond to the inevitable attack. A robust security program is key to achieving this goal.
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Implementing Business Continuity Plans
Why Business Continuity? Cybersecurity typically looks at confidentiality, integrity and availability of data and the ecosystems around it. Availability is generally considered a basic requirement, as without a fully functional information system, organizations cannot execute their processes. And obviously, if a business can’t execute its processes, it fails… Business Continuity Management (BCM), therefore, ensures
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Black Hat
Quick AI Powered Product Questions for Vendor Halls
Black Hat USA is next week, and one prediction I won’t need a crystal ball for is that the vendor hall will be absolutely plastered with “AI-Powered” everything. It’s no secret that machine learning and deep learning approaches have been part of security products for quite some time, and these approaches are effective when applied
9 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
More than ChatGPT: Privacy and Confidentiality in the Age of LLMs
Much has been made about the privacy and confidentiality issues with ChatGPT. Just take a look at the press for a list of companies prohibiting ChatGPT usage by their employees, but I’d argue there’s an equally if not far more concerning issue impacting privacy and confidentiality beyond ChatGPT, and that’s individual experimenters distributed across organizations.
9 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
What You Can’t See: Visualizing and Addressing MITRE ATT&CK Coverage Gaps with Threat Navigator
Imagine you're safeguarding a fortress in a vast landscape, not knowing from which direction the next attack might come. This scenario is not too different from the challenges organizations face in the cybersecurity landscape today. In this blog post, Marie Singleton and Pascal Reymond outline the onboarding process and core ideas behind Threat Navigator, Kudelski
9 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
From ChatGPT to Microsoft Copilot – Bridging the AI Security Divide
In this article, Nathan provides security leaders with a primer on inherent AI risk and the real-world impacts of attacks on AI applications and machine learning systems. With the recent developments in AI-powered assistants, such as ChatGPT and Bing, and mainstream acceptance in the enterprise environment growing, with the launch of Microsoft Copilot, an analysis
11 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
1
2
…
4
5
next page