Fresh Thinking for the Modern CISO
powered by Kudelski SecurityAttackers Know Microsoft 365 Better Than You Do
Users have taken to Microsoft Office 365's tools, but many are unaware of free features that come with their accounts -- features that would keep them safe. Organizations have quickly adopted the full-featured set of productivity and collaboration tools offered by...
read moreIdentifying Malicious Traffic on Your Web or Mobile Application: 6 Signs to Look For
Additional online traffic during the pandemic has increased cases of fraud and credential stuffing, giving fraudsters more ways to get into your web and mobile platforms. During such an attack, it’s not uncommon for 80-99% of traffic to ultimately be found to be...
read moreBeyond Compliance: 5 Ways Healthcare Organizations Can Improve Their Cybersecurity Posture
Recent high-profile ransomware attacks on hospitals have once again demonstrated the vital importance of securing healthcare IT infrastructures. When cyberattacks have the potential to cause morbidity and even loss of life, it’s absolutely imperative to understand and...
read moreBuilding a Vendor Risk Management Program
Time to update your vendor risk management program? In this article, Graeme Payne, Kudelski Security’s practice leader for strategy, risk, and compliance, covers the four essential areas for consideration in building a robust VRM. You may have a grasp on your own...
read moreBusiness Agility 2020: How to Achieve 360-Degree Security Visibility in the COVID Era
Among the chief concerns for security leaders today is a lack of visibility into risk and threats in the corporate ecosystem. COVID has only exacerbated the issue as organizations of all sizes and in all industries accelerate digital transformation plans in order to...
read moreIT vs. OT Security: 6 Strategies You Can Adapt to Secure OT Environments
The convergence of IT/OT means OT environments are no longer “walled off” from the rest of the organization or even the rest of the world. Exposure to cybersecurity threats in these systems is growing, and a successful attack could be extremely damaging to production,...
read moreThrough an Assessor’s Lens: Discovering the Value of a NIST CSF Assessment
NIST CSF, a cybersecurity framework helping uncover unknown risks, set up new controls, break down internal silos, achieve cybersecurity maturity. As cybersecurity continues to mature and be at the top of everyone’s mind, a natural shift has occurred from focusing on...
read more5 Things You Can Do Right Now to Improve Office 365 Security
The Microsoft Office 365 productivity suite counts around 200 million active users per month, making it an incredibly attractive target for cybercriminals. In fact, 85% of security incidents investigated by the Kudelski Security Incident Response team in 2019 can be...
read more