FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Cloud Security
Bookmark
Embracing the Future with Amazon Security Lake – Why It Matters
4 minute read
Trends & Insights
Bookmark
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
12 minute read
Artificial Intelligence
Bookmark
What You Need To Know About The EU AI Act
11 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
XDR Vs MDR Vs EDR
Bookmark
XDR vs MDR vs EDR: What’s the Difference?
5 minute read
XDR vs SIEM vs SOAR
Bookmark
What’s the Difference Between SIEM, XDR and SOAR?
5 minute read
Next-Generation EDR
Bookmark
Next Generation EDR: How to Maximize its Value
5 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
Board Communication
Bookmark
The ModernCISO Minute: Board Communication
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
Kudelski Security Team
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Subscribe
Favorite posts
Search posts on the site:
Posts and Videos by the Kudelski Security Team
Trends & Insights
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
This briefing highlights the most important findings from our 2024 Cybersecurity Trends and Insight report, including perspectives on the current state of cybersecurity, how trends will play out, and how organizations can address evolving risk, you can download the 2024 Cybersecurity Trends and Actionable Insights here. The field of cybersecurity is undergoing rapid change. Methods
12 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
XDR Vs MDR Vs EDR
XDR vs MDR vs EDR: What’s the Difference?
Does your organization have adequate protection against cybersecurity attacks? As the threats from hackers evolve – increasing in sophistication, volume, and speed – so must your security solutions and strategy. Any discussion on solutions for identifying and dealing with threats and attacks features three topics: Endpoint Detection and Response (EDR) Extended Detection and Response (XDR)
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
XDR vs SIEM vs SOAR
What’s the Difference Between SIEM, XDR and SOAR?
When it comes to cybersecurity, there are a lot of acronyms you might come across. EDR, NAC, ZTNA, DLP—the list goes on. However, some will be much more critical to your business than others, and in this blog, we’re going to take a closer look at the difference between SIEM and XDR, as well as
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Next-Generation EDR
Next Generation EDR: How to Maximize its Value
For many years, Endpoint Detection and Response (EDR) solutions were considered to be the foundation of an effective cybersecurity strategy. On one level, this makes total sense. Afterall, it’s estimated that endpoints—physical devices connected to a network—are the starting point for and 70% of successful data breaches. Protecting these elements of your network is critical
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
MDR vs XDR
MDR vs XDR: Everything You Need to Know
Extended Detection and Response (XDR) is a popular topic in the cybersecurity sector right now. Cynics may say that Sales will put an X in front of anything to try and give it the edge. But in this case, X really does stand for ‘eXtended’, so it’s there for good reason. XDR is a platform
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
What Is XDR
Everything You Need To Know About XDR
As digital infrastructure becomes the backbone of modern business, the sophistication and frequency of cyber threats have escalated, making advanced security measures a necessity. These digital infrastructures and remote working trends have expanded the cybersecurity perimeter, creating a wider attacker surface and introducing new risks and vulnerabilities that organizations need to manage As threats evolve
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
The Trouble with Cybersecurity Awareness Month…
October was Cybersecurity Awareness Month, so, not surprisingly, we see a lot of media coverage about cybersecurity and hear about our clients’ cybersecurity teams focusing on the implementation of best practices. But as October moves to November, the emphasis on awareness gets pushed aside. Just when a company thinks it is making good progress on
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
operational technology
Make Buildings Work Smarter, Not Harder
A typical office environment looks significantly different from a few years ago (and no, this is not another “effects of the pandemic” story). In this case the difference-maker is building automation, which has become more widely embraced for managing commercial buildings as organizations and property owners realize the benefits of centrally controlling and managing independent
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory
The ModernCISO Guide to Zero Trust for Microsoft
This guide will take you through the essentials of building out Zero Trust within a Microsoft environment.
1 minute read
Share this Guide
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
What You Can’t See: Visualizing and Addressing MITRE ATT&CK Coverage Gaps with Threat Navigator
Imagine you're safeguarding a fortress in a vast landscape, not knowing from which direction the next attack might come. This scenario is not too different from the challenges organizations face in the cybersecurity landscape today. In this blog post, Marie Singleton and Pascal Reymond outline the onboarding process and core ideas behind Threat Navigator, Kudelski
9 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Pentesting
From Theory to Practice: Getting Started with Red Teaming
It seems like everyone is talking about red teaming these days and for good reason. Red teaming can be an incredibly useful exercise for organizations looking to test their threat detection and response capabilities as well as their security maturity as a whole. It’s an evolution of the traditional network pentest, but there are key
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It Cyber threat intelligence programs play a foundational role in protecting modern enterprises from cyberattacks, informing security priorities, data collection and decision making. This blog introduces some of the key concepts and how to get started with cyber threat intelligence. What
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Deutsch
6 Schritte Zu Effektiver Datensicherheit
This article was originally published in IT-daily.net, Feb 2023 authored by Kudelski Security Datenschutz spielt in Unternehmen eine immer wichtigere Rolle. Bisher vertrauen viele auf das sogenannte Discovery-First-Modell. Bevor sich aber mit diesem Ansatz die Sicherheit verbessern lässt, sind aufwändige Analysen notwendig: Welche Daten sind an welchem Ort gespeichert? Wem gehören sie? Und wer kann
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
“I’m a New Security Leader and My Business Has Been Breached. What Next?” An Eight-Step Guide to Managing a Cyber-Attack for the First Time.
It comes as no surprise to anyone who follows industry news that reports of cybercrime are increasing. While no security leader ever gets ‘used’ to being breached, the first time it happens is especially daunting. This is a guide put together for new security leaders, based on discussions with our Incident Response team and CISOs
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
Our Top Cybersecurity Predictions for 2023
It’s the time of year when the industry begins making their top cybersecurity predictions for the year ahead. Gartner, among others, recently released their top 8 cybersecurity predictions for 2023, writing that supply chain and geopolitical issues will continue to dominate cybersecurity. In this article, our team looks into the proverbial crystal ball to share
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
1
2
3
4
next page