FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Artificial Intelligence
Bookmark
Firewalling Large Language Models with Llama Guard
10 minute read
Cloud
Bookmark
Pushing Security to the Edge – What is Edge Security
6 minute read
Advisory Services
Bookmark
Vulnerability Management: Common Mistakes and Misconceptions
9 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
Advisory
Bookmark
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
8 minute read
operational technology
Bookmark
Make Buildings Work Smarter, Not Harder
5 minute read
Zero Trust
Bookmark
Why A New Approach to Zero Trust Architecture Matters to Your Networks
6 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
OT Talent Retention
Bookmark
The ModernCISO Minute: OT Talent Retention
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
ModernCISO Basics
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Events
Subscribe
Favorite posts
Search posts on the site:
Filter by
Topic
Advisory
Advisory Services
Blockchain
CISO
Cloud
Incident Response
Microsoft Security
Network Security
operational technology
OT Security
Pentesting
Quantum Computing
Risk Management
Zero Trust
Filter by
Author
Chris Goosen
Christina Anderson
Gijs Van Den Elshout
Graeme Payne
Johann Paimboin
Kudelski Security Team
Lonny Brissac
Roger Hill
Ron Frederick
Tommaso Gagliardoni
Vincent Waart
ModernCISO Basics
Not-so-basic breakdowns of what people are talking about in the cybersecurity industry today.
Advisory
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
Drawn by their convenience, scalability, and cost-effectiveness, today’s businesses are taking advantage of Software-as-a-Service (SaaS) applications more and more often. The global SaaS market is forecast to see an impressive 18% compound annual growth rate over the next four years, with more than 99% of organizations already relying on at least one SaaS app to
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
operational technology
Make Buildings Work Smarter, Not Harder
A typical office environment looks significantly different from a few years ago (and no, this is not another “effects of the pandemic” story). In this case the difference-maker is building automation, which has become more widely embraced for managing commercial buildings as organizations and property owners realize the benefits of centrally controlling and managing independent
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Zero Trust
Why A New Approach to Zero Trust Architecture Matters to Your Networks
Zero Trust Starts with 100 Percent Mindset There’s nothing new to say when it comes to zero trust security, at least in terms of tactics. Many of the most commonly deployed methods have been around for decades: the least privilege principle, need-to-know access, firewalls, and VPNs. But if we’re talking about the concept of zero
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Dealing with a cyber-attack? Six common pitfalls companies should avoid when handling a security crisis
Managing a cyber crisis is one of the most challenging and stressful aspects of a CISO’s job. Aside from the actual challenge and stress of trying to handle a security incident and help your business successfully recover and rebound, far too many security leaders’ work is made exponentially worse by falling into a number of
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Is my company ready to handle a cyber-attack? Three tips for security leaders to best prepare for and mitigate ongoing security risks
It should be no secret by now that security threat actors constantly evolve their tactics to keep up with new security measures. This means that organizations also need to continually update their efforts to ensure a strong security posture to protect their assets. Especially since a crisis can arise at inopportune moments, such as in
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Is your business dealing with a cybersecurity attack? Here are the five most important steps security leaders and boards must take when dealing with a cyber-attack
As cyber-attacks continue to hit businesses of all sizes, we know that both CISOs and boards struggle during what is one of the most stressful situations they experience. While there’s no one-size-fits-all plan that addresses every organization and every kind of breach or attack they may face, any successful cybersecurity incident response effort requires planning,
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Pentesting
From Theory to Practice: Getting Started with Red Teaming
It seems like everyone is talking about red teaming these days and for good reason. Red teaming can be an incredibly useful exercise for organizations looking to test their threat detection and response capabilities as well as their security maturity as a whole. It’s an evolution of the traditional network pentest, but there are key
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Risk Management
How to Build a Vendor Risk Management Program
Time to update your vendor risk management program? In this article, Graeme Payne, Kudelski Security’s practice leader for strategy, risk, and compliance, covers the four essential areas for consideration in building a robust VRM program. Objectives of a Vendor Risk Management Program Identifying Risk within Your Vendor Landscape Evaluating and Monitoring Vendors for Risk Integrating
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It Cyber threat intelligence programs play a foundational role in protecting modern enterprises from cyberattacks, informing security priorities, data collection and decision making. This blog introduces some of the key concepts and how to get started with cyber threat intelligence. What
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Quantum Computing
Beginners Guide to Quantum Computing and the New IT Revolution
Quantum Computing is going to be the next IT revolution, and it’s going to be disruptive. At Kudelski Security, our focus is on helping clients prepare for the new era of quantum computing. These futuristic machines are on the way to being built right now, and they can crack open the most secure cryptographic codes
24 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: Answering the Most Challenging Board Questions
In the first part of this series, I introduced the research on CISO board communications and metrics Kudelski Security performed in collaboration with our Client Advisory Council. The report is available in full here. As with all meaty reports, there’s a lot of content. This article seeks to cover some interesting insight that didn’t make
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: The Good Communication Guide
Cybersecurity incidents are increasing, and with it, the pressure on CISOs to get cybersecurity right. At the heart of this challenge is getting the full support of the board of directors. The board sets the tone for the organization, gives the green light for adequate resources, ensures alignment of investments to company business objectives, and
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: Communication Strategies: Security Benchmarking
Kudelski Security is supported by its Client Advisory Council (CAC) a group of industry CISOs who provide insight and advice on the strategic direction and program priorities of the business. The Client Advisory Council report on Facilitating Cyber Board Communications was written as a result of discussions with the CAC members as well as seasoned
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud
Pushing Security to the Edge
It’s a fairly simple equation. The rise in remote workers generates a rise in traffic on corporate networks from different locations, which in turn generates the need to rethink network security strategies. Enter “Secure Access Service Edge” (SASE), a security design methodology and networking model proposed by the analyst and research firm Gartner. SASE provides
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
OT Security
IT Strategies You Can Adapt to Secure OT Environments
The convergence of IT/OT means OT environments are no longer “walled off” from the rest of the organization or even the rest of the world. Exposure to cybersecurity threats in these systems is growing, and a successful attack could be extremely damaging to production, safety, and system availability. Managing security and risk in OT environments
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
1
2
next page