FR
DE
Blogs
Advisory Services
Application Security
Artificial Intelligence
Blockchain
CISO
All Blogs
Artificial Intelligence
Bookmark
Firewalling Large Language Models with Llama Guard
10 minute read
Cloud
Bookmark
Pushing Security to the Edge – What is Edge Security
6 minute read
Advisory Services
Bookmark
Vulnerability Management: Common Mistakes and Misconceptions
9 minute read
ModernCISO Basics
Blockchain
Cloud
Pentesting
Network Security
Risk Management
All Basics
Advisory
Bookmark
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
8 minute read
operational technology
Bookmark
Make Buildings Work Smarter, Not Harder
5 minute read
Zero Trust
Bookmark
Why A New Approach to Zero Trust Architecture Matters to Your Networks
6 minute read
ModernCISO Minute
Blockchain Cybersecurity
Incident Response
Digital Transformation
Crisis Response Analysis
All ModernCISO Minutes
Building a SOC
Bookmark
The ModernCISO Minute: Building a Security Operations Center
Board Reporting
Bookmark
The ModernCISO Minute: Board Reporting
OT Talent Retention
Bookmark
The ModernCISO Minute: OT Talent Retention
ModernCISO Guides
Advisory
Managed Detection and Response
All Guides
Advisory
Bookmark
The ModernCISO Guide to Zero Trust for Microsoft
Advisory
Bookmark
The Four Step Framework for Managing Insider Risk
Managed Detection and Response
Bookmark
How to Set Security Program Priorities that Enhance Cyber Resilience
ModernCISO Events
Subscribe
Blogs
Powered by Kudelski Security
Blogs
Advisory Services
Application Security
Artificial Intelligence
Automation and Orchestration
Black Hat
Blockchain
CISO
Cloud Security
Cryptocurrency
Cryptography
Cyber
Cyber Resilience
Cybersecurity
Deception
Defense
Disruptive Technology
GDPR
Incident Response
IoT
Kudelski Security
Managed Security Services
Microsoft Security
Office 365
Operational Technology
Penetration Testing
Quantum
Ransomware
Risk
Secrets
Security Advisory
Security Conference
Social Engineering
Team work
Threat Detection
Threat Intelligence
Uncategorized
Basics
ModernCISO Minute
Events
Subscribe
Favorite posts
Search posts on the site:
Filter by
Topic
Advisory Services
Application Security
Artificial Intelligence
Black Hat
Blockchain
CISO
Cloud
Cloud Security
Cryptocurrency
Cybersecurity
Cybersecurity Trends
Incident Response
Managed Detection and Response
Microsoft Security
Operational Technology
Penetration Testing
Ransomware
Security Advisory
Zero Trust
Filter by
Author
Christina Anderson
Francisco Donoso
Nathan Hamiel
Kudelski Security Team
Chris Goosen
Ron Frederick
Graeme Payne
Shannon Garcia
Roger Hill
Ernie Anderson
Zach Luze
Olivier Spielmann
Vincent Waart
Gijs Van Den Elshout
Felix Jaggi
Terry Vogelsang
Nathan Shock
Romain Aviolat
Blogs
A series exclusively authored by Kudelski Security’s experts, containing technical deep dives, the latest threat trends, articles on pentesting, OT, IR, MDR, and more.
Cybersecurity Trends
Security Models for New Enterprise Perimeter Threats
The security industry faced a variety of challenges during these last few years. The pandemic put pressure on security and IT operations and shone a spotlight on underlying issues many organizations were facing in terms of their digital transformation and security posture. If that wasn’t enough, the threat landscape also shifted and is now more
4 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
Closing the Cyber Skills Gap: Why Deputy CISOs Are Critical
In this article, originally published in Cyber Security Magazine, we explain the growing importance of the Deputy CISO in closing the cyber skills gap and advises on eight key competencies every security lieutenant needs to develop. The Era of the Security Lieutenant Mastering the Deputy CISO Role Security Requires the Entire Organization Download the Research:
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
Attackers Know Microsoft 365 Better Than You Do
Users have taken to Microsoft Office 365’s tools, but many are unaware of free features that come with their accounts — features that would keep them safe. Organizations have quickly adopted the full-featured set of productivity and collaboration tools offered by Office 365 (O365), which was moved under the Microsoft 365 umbrella. They’re leveraging Microsoft
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Application Security
6 Signs of Malicious Traffic on Your Web or Mobile App
We sat down with Dan Woods, VP of the Shape Intelligence Center, which is now part of F5 Networks, to talk about how we can best identify malicious traffic on web and mobile applications. This article summarizes six of the primary indicators they look for to determine genuine users vs. imposters. Disruption of normal traffic
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
Beyond Compliance: 5 Ways Healthcare Organizations Can Improve Their Cybersecurity Posture
Recent high-profile ransomware attacks on hospitals have once again demonstrated the vital importance of securing healthcare IT infrastructures. When cyberattacks have the potential to cause loss of life, it’s absolutely imperative to understand and mitigate vulnerabilities in the technology environment and cultivate the strongest cybersecurity posture possible. Beyond the obvious of getting yourself a good
8 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Cybersecurity
The Value of NIST CSF Assessments through an Assessor’s Lens
In this article: What is NIST CSF? Why use NIST CSF? Incorporating NIST CSF into your cybersecurity program NIST CSF assessments Risk assessments for Covid-19 and beyond What is NIST CSF? NIST CSF is a cybersecurity framework helping uncover unknown risks, set up new controls, break down internal silos, and achieve cybersecurity maturity. As cybersecurity
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
5 Things You Can Do Right Now to Improve Office 365 Security
The Microsoft Office 365 productivity suite counts around 200 million active users per month, making it an incredibly attractive target for cybercriminals. In fact, 85% of security incidents investigated by the Kudelski Security Incident Response team in 2019 can be attributed to an Office 365 email compromise. 85% of security incidents investigated by our team
6 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
How to Become a CISO in the Modern Day
Today’s top CISOs come from many different backgrounds. Some have held more technical roles and decided to switch gears and learn the art of business. While others come from a strong compliance and policy background and were inspired by the machinations of security. Whatever their origin, each CISO has its own blend of qualifications, experience,
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
Evolution to Becoming a Modern Day CISO
Today’s top CISOs come from many different backgrounds: some have held more technical roles and decided to switch gears and learn the art of business, while others came from a strong compliance and policy background and were inspired by the machinations of security. Whatever their origin, each CISO has its own blend of qualifications, experience,
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud
Beyond Security: Creating a Shared Vision for Flexible Cloud Governance
Cybersecurity organizations should partner with business units to create a shared and flexible cloud governance model that better enables responsible cloud adoption. Businesses cannot (and often will not) wait for security organizations to create inflexible governance frameworks for cloud adoption. After all, the cloud is supposed to be flexible and business-enabling. The high-speed transformation to
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
Kudelski Security Introduces Crypto.com Integration
When the Blockchain Security Center was conceived in 2018, we had a few goals in mind to help companies, projects, and inventors around the world use blockchain and advanced cryptography safely. With over 50 commercial applications as well as work with some of the world’s largest exchanges, such as Crypto.com, our perspective as well as
3 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud Security
How to Enable Office 365 Audit Logging
One of the misconceptions about cloud services is that you have to surrender all control when you sign-up. While it is true that you may no longer have racks of servers with blinking lights humming away in your data center, it doesn’t mean that you no longer have any visibility into how your users use
3 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
5 Ways to Improve Vulnerability Threat Management
Good security programs start with a mindset that it’s not about the tools; it’s what you do with them. This mindset is most evident when critical vulnerabilities are released and everyone scrambles to mitigate exploitation. Most recently, we saw this following the release of the latest critical Windows vulnerability (CVE-2020-0610 and others), which some folks
5 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
Global Cybersecurity Outlook: Andre Kudelski at World Economic Forum
The annual cost of cyberattacks is expected to reach $6 trillion by 2021. What trends will shape cybersecurity in the near future? On the Forum Agenda: - Threats and opportunities for emerging technologies - New models of public-private information exchange - Improving organizational management and talent development Access the Platform for Shaping the Future of
1 minute read
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
prev page
1
2
3
4
5
next page