FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Trends & Insights
Bookmark
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
12 minute read
Artificial Intelligence
Bookmark
What You Need To Know About The EU AI Act
11 minute read
Artificial Intelligence
Bookmark
AI Solutions Risk Gap: A Better Way To Think About AI Risk
7 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
XDR Vs MDR Vs EDR
Bookmark
XDR vs MDR vs EDR: What’s the Difference?
5 minute read
XDR vs SIEM vs SOAR
Bookmark
What’s the Difference Between SIEM, XDR and SOAR?
5 minute read
Next-Generation EDR
Bookmark
Next Generation EDR: How to Maximize its Value
5 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
Board Communication
Bookmark
The ModernCISO Minute: Board Communication
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
Kudelski Security Team
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Subscribe
Favorite posts
Search posts on the site:
Posts and Videos by the Kudelski Security Team
Operational Technology
OT Security: The Time for Remote Access Security is Now
In this article, originally published in Industry Today, Francisco Donoso explores the increasing risk associated with connected critical infrastructure systems and steps security leaders can take to prevent future OT attacks. OT attacks are on the rise Remote access vulnerabilities in connected OT systems Understanding OT vulnerabilities to mitigate risks Preventing future OT attacks OT
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
Security Advisory: Microsoft Reports Vulnerability in Azure Container Instances (ACI)
This security advisory was published in October 2021 in response to Microsoft’s disclosure of a vulnerability affecting Azure Container Instances (ACI) service. The following is a summary of the vulnerability, its impact, and initial recommendations for bolstering container security. Summary of the ACI Vulnerability Who Is Impacted by the Vulnerability Recommendations for Improving Container Security
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
The Anatomy of an IT/OT Cyber Attack
This article summarizes material from a presentation, “Overcoming Industrial Security Challenges,” held during Kudelski Security’s European Cyber Summit in February 2021. Threats to the Combined IT/OT Environment Understanding the IT/OT Overlap Exploiting the IT/OT Overlap – Two Real-World Examples Overcoming the Challenges of IT/OT Security Get in Touch The convergence of IT/OT is upon us,
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Deutsch
Sicherheit von Webanwendungen auf dem Prüfstand: So nehmen Bots gezielt Schwachstellen in der Geschäftslogik ins Visier
Wann es sinnvoll ist, hochkritische Anwendungen gegen Bot-Attacken abzusichern und in fortschrittliche Anti-Betrugs- und Anti-Bot-Technologie zu investieren Die jüngsten Schlagzeilen über Shopping-Bots stellen jeden CISO vor die Frage, ob auch sein eigenes Unternehmen dem Risiko eines gezielten Bot-Angriffs ausgesetzt ist und welche Maßnahmen zu ergreifen sind, um das zu verhindern. Nike und Sony sind nicht
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Security Advisory
Security Advisory: Kaseya VSA Ransomware Attack
This security advisory was published in July 2021 following reports that a number of managed service providers (MSPs) became victims of a ransomware attack perpetrated by the REvil group through Kaseya VSA. The following is a summary of the attack, the CFC’s response, and initial recommendations for mitigation. Summary of the Kaseya VSA Supply Chain
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
The Critical Infrastructure Cybersecurity Dilemma
The Colonial Pipeline and Oldsmar incidents have highlighted the challenge of securing older operational technology systems. This article, originally published in Security Info Watch, explains somehow to prevent and mitigate some of the emerging risks affecting critical infrastructures today. Emerging Risks to Critical Infrastructure Systems Understanding the New IT/OT Landscape Preventing and Mitigating Critical Infrastructure
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
Data Security as a Business Enabler
In this five-minute read, we make the case for security to not only participate but lead secure digital transformation in order to protect the business’s most valuable asset: data. Emphasizing Security in Digital Transformation (DX) The Challenge of Legacy Systems in DX Accountability and Predictability in Secure Digital Transformation Get in Touch Security has evolved
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
How Blockchain Impacts Enterprise Security and Operations
The continued expansion and use of cryptocurrency has always experienced growing pains, as recent events in 2022 show. But look further back to the major burst of 2018 and you’ll see that crypto has a way of bouncing back—even amid global economic downturns. The potential for the blockchain technology behind it, is just getting started,
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
Blockchain Risks that Impact Crypto Exchange Security
It’s clear from the Axie Infinity Ronin Network breach of 2020, the hack of the DeFi protocol Poly Network in August 2021, and further back – the KuCoin attack of 2020 and the Binance Security breach in 2019 that blockchain isn’t inherently secure. This blog post shows how the blockchain and distributed ledger technology at
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Application Security
Is Your Web App Secure Against Shopping Bot Attacks?
Recent headline-making shopping bots may have CISOs asking “Is our business at risk of a targeted bot attack?” and “What can I do to prevent it from happening to us?” Nike and Sony are not the first, nor will they be the last, brands to experience reputational damages due to a successful shopping bot attack.
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Deutsch
Solide Basis für IT-Sicherheit: so schaffen Unternehmen einen effizienten Compliance-Ansatz
Die Einhaltung gesetzlicher Compliance-Vorschriften dient Unternehmen als Grundlage für ethisches Wachstum und Erfolg – sie bildet das Fundament, auf dem das Unternehmen seinen Ruf bei Kunden, Interessenten und Lieferanten aufbauen kann. Verstößen gegen Vorschriften können nicht nur Strafen, Sanktionen und peinliche Schlagzeilen zur Folge haben, sondern auch die Karriere von Mitarbeitern gefährden. Zu beobachten war
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
4 Roadblocks to Faster Threat Detection & Response and 3 Things You Can Do About It
In this blog on Managed Detection and Response, Kudelski Security's Managed Detection and Response Team discuss four major issues familiar to any security leader who has wrestled with making threat detection and response more efficient. If you want to cut straight to the chase, check out our ModernCISO Guide on cyber resilience– it’s a practical guide to
9 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
A CISO’s Roadmap for IT/OT Convergence
Hyperconnectivity of OT, ICS and SCADA environments has created an overlap between IT and OT environments, exposing formerly segmented systems to much wider attack surfaces. CISOs operating in newly or soon-to-be converged IT/OT environments, therefore, have a new charge — to integrate OT security into their existing security programs. It’s critical, however, that security leaders
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
Security Models for New Enterprise Perimeter Threats
The security industry faced a variety of challenges during these last few years. The pandemic put pressure on security and IT operations and shone a spotlight on underlying issues many organizations were facing in terms of their digital transformation and security posture. If that wasn’t enough, the threat landscape also shifted and is now more
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
Closing the Cyber Skills Gap: Why Deputy CISOs Are Critical
In this article, originally published in Cyber Security Magazine, we explain the growing importance of the Deputy CISO in closing the cyber skills gap and advises on eight key competencies every security lieutenant needs to develop. The Era of the Security Lieutenant Mastering the Deputy CISO Role Security Requires the Entire Organization Download the Research:
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
prev page
1
2
3
4
next page