Fresh Thinking for the Modern CISO

powered by Kudelski Security
  • Bots are Exploiting Business Logic Vulnerabilities. Is Your Web App Secure?

    Recent headline-making shopping bots may have CISOs asking “Is our business at risk of a targeted bot attack?” and “What can I do to prevent it from happening to us?” Nike and Sony are not the first, nor will they be the last, brands to experience reputational damages due to a successful shopping bot attack….

    Read More >>
  • A CISO’s Roadmap for IT/OT Convergence

    Hyperconnectivity of OT, ICS and SCADA environments has created an overlap between IT and OT environments, exposing formerly segmented systems to much wider attack surfaces. CISOs operating in newly or soon-to-be converged IT/OT environments, therefore, have a new charge — to integrate OT security into their existing security programs.   It’s critical, however, that security…

    Read More >>
  • Closing the Cyber Skills Gap: Why 2021 Is the Year of the Deputy

    No matter how good a CISO is, there aren’t enough hours in the day to handle the myriad of new responsibilities that have been thrown at them. To be effective and ensure a strong security posture, CISOs need a lieutenant to head up each domain that falls within their scope. Given all the challenges CISOs…

    Read More >>
  • A New Enterprise Perimeter and the Cybersecurity Raising Challenges

    The security industry has faced a variety of challenges throughout 2020. The pandemic put pressure on security and IT operations and shone a spotlight on underlying issues many organizations were facing in terms of their digital transformation and security posture. If that wasn’t enough, the threat landscape also shifted and is now more volatile than…

    Read More >>
  • 7 Red Flags to Look for in Your MSSP Relationship

    The managed security service provider market is crowded with 5,000+ companies worldwide offering some degree of MSS. That’s good news and bad news for customers. Competition should drive quality of service up across the board. But it also presents a paradox of choice, and many customers find themselves with buyer’s remorse. A good MSSP, however,…

    Read More >>
  • Attackers Know Microsoft 365 Better Than You Do

    Users have taken to Microsoft Office 365’s tools, but many are unaware of free features that come with their accounts — features that would keep them safe. Organizations have quickly adopted the full-featured set of productivity and collaboration tools offered by Office 365 (O365), which was moved under the Microsoft 365 umbrella this spring. They’re leveraging Microsoft…

    Read More >>
  • Identifying Malicious Traffic on Your Web or Mobile Application: 6 Signs to Look For

    Additional online traffic during the pandemic has increased cases of fraud and credential stuffing, giving fraudsters more ways to get into your web and mobile platforms. During such an attack, it’s not uncommon for 80-99% of traffic to ultimately be found to be malicious. The high volume and velocity of malicious traffic during such an…

    Read More >>
  • Beyond Compliance: 5 Ways Healthcare Organizations Can Improve Their Cybersecurity Posture

    Recent high-profile ransomware attacks on hospitals have once again demonstrated the vital importance of securing healthcare IT infrastructures. When cyberattacks have the potential to cause morbidity and even loss of life, it’s absolutely imperative to understand and mitigate vulnerabilities in the technology environment and cultivate the strongest cybersecurity posture possible.   Medical campus environments present…

    Read More >>