FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Artificial Intelligence
Bookmark
Firewalling Large Language Models with Llama Guard
10 minute read
Cloud
Bookmark
Pushing Security to the Edge – What is Edge Security
6 minute read
Advisory Services
Bookmark
Vulnerability Management: Common Mistakes and Misconceptions
9 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
Advisory
Bookmark
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
8 minute read
operational technology
Bookmark
Make Buildings Work Smarter, Not Harder
5 minute read
Zero Trust
Bookmark
Why A New Approach to Zero Trust Architecture Matters to Your Networks
6 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
OT Talent Retention
Bookmark
The ModernCISO Minute: OT Talent Retention
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
Blogs
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Events
Subscribe
Favorite posts
Search posts on the site:
Filter by
Topic
Advisory Services
Application Security
Artificial Intelligence
Black Hat
Blockchain
CISO
Cloud
Cloud Security
Cryptocurrency
Cybersecurity
Cybersecurity Trends
Incident Response
Managed Detection and Response
Microsoft Security
Operational Technology
Penetration Testing
Ransomware
Security Advisory
Zero Trust
Filter by
Author
Christina Anderson
Francisco Donoso
Nathan Hamiel
Kudelski Security Team
Chris Goosen
Ron Frederick
Graeme Payne
Shannon Garcia
Roger Hill
Ernie Anderson
Zach Luze
Olivier Spielmann
Vincent Waart
Gijs Van Den Elshout
Felix Jaggi
Terry Vogelsang
Nathan Shock
Romain Aviolat
Blogs
A series exclusively authored by Kudelski Security’s experts, containing technical deep dives, the latest threat trends, articles on pentesting, OT, IR, MDR, and more.
Cybersecurity Trends
Our Top Cybersecurity Predictions for 2023
It’s the time of year when the industry begins making their top cybersecurity predictions for the year ahead. Gartner, among others, recently released their top 8 cybersecurity predictions for 2023, writing that supply chain and geopolitical issues will continue to dominate cybersecurity. In this article, our team looks into the proverbial crystal ball to share
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
6 Steps to Effective Data Security
In this blog post, we’ll identify where today’s data security programs often fail and look at six steps to effective data security. These cover everything from product definition, minimal viable discovery, and services, to telemetrics, metrics as well as threat detection and response capabilities. If you’ve ever asked the question: ‘How can my company reduce
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Getting Started with Cyber Risk Quantification and Decisioning
Over the last few years, there has been increasing interest by CISOs and business leaders in cybersecurity risk quantification. Many of the CISOs we are working with are keen to connect security risk to the language of business. In this article, Graeme Payne reviews how cyber risk quantification and decisioning can be used to communicate
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
What’s Next in Cybersecurity: Predictions 2022
Every year, the cybersecurity sector publishes articles on what we can expect to see in the course of the year. This article, published originally in InfoSec on August 8, 2022 by Ali Hadley looks at the predictions Kudelski Security CEO, Andrew Howard, made at the beginning of 2022 in a podcast with Infosec. As we
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
15 Practical Tips for More Effective Cybersecurity Incident Response
Building an effective cyber incident response plan requires more than having the right tools in place or engaging the right cyber incident response services. As a security leader, you’re responsible for building the right security foundation and fostering a culture of teamwork and open dialogue during a crisis. Summarizing a recent webinar, this article will
11 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Managed Detection and Response
MITRE ATT&CK & D3FEND: Step-by-Step Guide to Closing Security Visibility Gaps
In this article, summarized from a recent managed detection and response webinar, we’ll explain what MITRE D3FEND is, how it complements the MITRE ATT&CK framework, and you can use it to identify and close gaps in security visibility. It’s no secret that cybercrime is on the rise with attacks happening more frequently and for higher
10 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
2022 Cybersecurity Predictions
Last month Kudelski Security's CEO was interviewed by Infosec’s Chris Sienko, on the top risk and cybersecurity trends for 2022. The podcast can be accessed here. Think there’s nothing new under the sun? With cybersecurity trends, you wouldn’t be far off the truth. Every year opinion leaders outline the main cybersecurity trends to watch and
2 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
2022 Cybersecurity Trends – Cyber Work Podcast Interview
In January 2022, the Kudelski Security CEO was interviewed by Infosec’s Chris Sienko, on the top risk and cybersecurity trends for 2022. The podcast can be accessed here. The more things change; the more they stay the same, right? With cybersecurity trends, you wouldn’t be far off from the truth. Every year opinion leaders outline
3 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Ransomware
Ransomware Threats Are Here to Stay
Over the past year, security companies have witnessed the massive impact that ransomware attacks like SolarWinds and Kaseya have had on businesses. As businesses play catch up to the tactics used by hackers to deploy malware, even more sophisticated approaches are unleashed. As we prepare for 2023 and beyond, ransomware is one thing it’s safe
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Top 5 Tips for Bolstering Incident Response Readiness
In the first of this two-part series, Olivier Spielmann VP of managed security services EMEA at Kudelski Security discussed the factors that drive the need for a more comprehensive approach to Incident Response. The question of how to prevent cybersecurity attacks is never straightforward, but as cyber security attacks increase – especially over the festive
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
How to Build a Cohesive Approach to Incident Response
In this two-part series, Olivier Spielmann, VP managed security services EMEA at Kudelski Security discusses why incident response needs to widen its scope and what every security leader can do to make it happen. The Importance of Robust Incident Response Processes Trends in the Current Threat Landscape Taking a Proactive Approach to Incident Response Read
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
OT Security Best Practices for the Manufacturing Industry
As manufacturing relies more and more on remote access and automation, cyber hygiene continues to be one of the top challenges in securing manufacturers across the nation. This article aims to address the top security concerns impacting the manufacturing industry and how to protect OT environments from cyberattacks. The current threat to critical infrastructure systems
7 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Penetration Testing
3 Things Modern CISOs Can Do to Reduce the Attack Surface
In this four-minute read, Zach outlines three simple things CISOs and security leaders can do to reduce the modern enterprise attack surface: discovery, contextualization, and response. The Problem: Lack of Visibility into Old and New Assets The Solution: Transforming Asset Discovery and Vulnerability Management Discovering the attack surface Contextualizing the attack surface Responding to the
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
OT Security: The Time for Remote Access Security is Now
In this article, originally published in Industry Today, Francisco Donoso explores the increasing risk associated with connected critical infrastructure systems and steps security leaders can take to prevent future OT attacks. OT attacks are on the rise Remote access vulnerabilities in connected OT systems Understanding OT vulnerabilities to mitigate risks Preventing future OT attacks OT
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
prev page
1
2
3
4
5
next page