FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Cloud Security
Bookmark
Embracing the Future with Amazon Security Lake – Why It Matters
4 minute read
Trends & Insights
Bookmark
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
12 minute read
Artificial Intelligence
Bookmark
What You Need To Know About The EU AI Act
11 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
XDR Vs MDR Vs EDR
Bookmark
XDR vs MDR vs EDR: What’s the Difference?
5 minute read
XDR vs SIEM vs SOAR
Bookmark
What’s the Difference Between SIEM, XDR and SOAR?
5 minute read
Next-Generation EDR
Bookmark
Next Generation EDR: How to Maximize its Value
5 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
Board Communication
Bookmark
The ModernCISO Minute: Board Communication
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
ModernCISO Basics
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Subscribe
Favorite posts
Search posts on the site:
Filter by
Topic
Advisory
Advisory Services
Blockchain
CISO
Cloud
Incident Response
MDR vs XDR
Microsoft Security
Network Security
Next-Generation EDR
operational technology
OT Security
Pentesting
Quantum Computing
Risk Management
What Is XDR
XDR Vs MDR Vs EDR
XDR vs SIEM vs SOAR
Zero Trust
Filter by
Author
Chris Goosen
Christina Anderson
Gijs Van Den Elshout
Johann Paimboin
Kudelski Security Team
Lonny Brissac
Ron Frederick
Tommaso Gagliardoni
Vincent Waart
ModernCISO Basics
Not-so-basic breakdowns of what people are talking about in the cybersecurity industry today.
CISO
CISO Board Basics: The Good Communication Guide
Cybersecurity incidents are increasing, and with it, the pressure on CISOs to get cybersecurity right. At the heart of this challenge is getting the full support of the board of directors. The board sets the tone for the organization, gives the green light for adequate resources, ensures alignment of investments to company business objectives, and
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: Communication Strategies: Security Benchmarking
Kudelski Security is supported by its Client Advisory Council (CAC) a group of industry CISOs who provide insight and advice on the strategic direction and program priorities of the business. The Client Advisory Council report on Facilitating Cyber Board Communications was written as a result of discussions with the CAC members as well as seasoned
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud
Pushing Security to the Edge
It’s a fairly simple equation. The rise in remote workers generates a rise in traffic on corporate networks from different locations, which in turn generates the need to rethink network security strategies. Enter “Secure Access Service Edge” (SASE), a security design methodology and networking model proposed by the analyst and research firm Gartner. SASE provides
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
OT Security
IT Strategies You Can Adapt to Secure OT Environments
The convergence of IT/OT means OT environments are no longer “walled off” from the rest of the organization or even the rest of the world. Exposure to cybersecurity threats in these systems is growing, and a successful attack could be extremely damaging to production, safety, and system availability. Managing security and risk in OT environments
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Basics: Navigating Your First Year as a New CISO
The first year as a new CISO can be exhilarating and at times downright frightening. You have a lot to prove and minds to win over, but you also have the opportunity to start fresh and make a big impact. Early on, the emphasis is on learning the lay of the land of your new
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Basics: Navigating Your First Month as a New CISO
As a new CISO, the single most important thing you can do is to start building the relationships and political capital you’ll need to run your security program. In this article, we’ll share best practices for navigating your first 30 days on the job, including: Understanding the Political Landscape How does the organization view the
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
A Guide to Microsoft Passwordless Authentication
Passwords have long been a daily part of our lives. But in today’s modern, cloud-first world, the use of passwords alone leaves us increasingly more vulnerable to compromise. Large-scale data breaches are being reported more and more frequently in the media with more than 80% of hacking-related breaches involving compromised or weak credentials. Could passwordless
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
A Basic Guide to Crypto Exchange Security
This article is a practical summary of the top five areas, common to all major security standards and frameworks, which crypto exchange companies need to engage with, to protect their platform. Understand Risks and Threats Business Process Controls Policies and Procedures Vendors and Third Parties Security Vulnerabilities and Operational Capabilities (Pen Test!) June 2022 began
11 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Basics: Four Ways to Attract and Retain IT Developers
According to the U.S. Bureau of Labor Statistics, the demand for software developers is set to increase to 22% between 2022 and 2030. This percentage is almost 4% more than the growth of average careers. So, with the rise in qualified personnel, why is it that recruiting and retaining talent is such a challenge. Kudelski
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
prev page
1
2