Fresh Thinking for the Modern CISO

powered by Kudelski Security
  • 7 Red Flags to Look for in Your MSSP Relationship

    The managed security service provider market is crowded with 5,000+ companies worldwide offering some degree of MSS. That’s good news and bad news for customers. Competition should drive quality of service up across the board. But it also presents a paradox of choice, and many customers find themselves with buyer’s remorse. A good MSSP, however,…

    Read More >>
  • Attackers Know Microsoft 365 Better Than You Do

    Users have taken to Microsoft Office 365’s tools, but many are unaware of free features that come with their accounts — features that would keep them safe. Organizations have quickly adopted the full-featured set of productivity and collaboration tools offered by Office 365 (O365), which was moved under the Microsoft 365 umbrella this spring. They’re leveraging Microsoft…

    Read More >>
  • Identifying Malicious Traffic on Your Web or Mobile Application: 6 Signs to Look For

    Additional online traffic during the pandemic has increased cases of fraud and credential stuffing, giving fraudsters more ways to get into your web and mobile platforms. During such an attack, it’s not uncommon for 80-99% of traffic to ultimately be found to be malicious. The high volume and velocity of malicious traffic during such an…

    Read More >>
  • Beyond Compliance: 5 Ways Healthcare Organizations Can Improve Their Cybersecurity Posture

    Recent high-profile ransomware attacks on hospitals have once again demonstrated the vital importance of securing healthcare IT infrastructures. When cyberattacks have the potential to cause morbidity and even loss of life, it’s absolutely imperative to understand and mitigate vulnerabilities in the technology environment and cultivate the strongest cybersecurity posture possible.   Medical campus environments present…

    Read More >>
  • Building a Vendor Risk Management Program

    Time to update your vendor risk management program? In this article, Graeme Payne, Kudelski Security’s practice leader for strategy, risk, and compliance, covers the four essential areas for consideration in building a robust VRM.  You may have a grasp on your own organization’s security and have good data and threat visibility, but beyond your environment,…

    Read More >>
  • Business Agility 2020: How to Achieve 360-Degree Security Visibility in the COVID Era

    Among the chief concerns for security leaders today is a lack of visibility into risk and threats in the corporate ecosystem. COVID has only exacerbated the issue as organizations of all sizes and in all industries accelerate digital transformation plans in order to enable a mobile workforce. The ecosystem today has become expanded and fragmented…

    Read More >>
  • IT vs. OT Security: 6 Strategies You Can Adapt to Secure OT Environments

    The convergence of IT/OT means OT environments are no longer “walled off” from the rest of the organization or even the rest of the world. Exposure to cybersecurity threats in these systems is growing, and a successful attack could be extremely damaging to production, safety, and system availability. Managing security and risk in OT environments…

    Read More >>
  • Through an Assessor’s Lens: Discovering the Value of a NIST CSF Assessment

    NIST CSF, a cybersecurity framework helping uncover unknown risks, set up new controls, break down internal silos, achieve cybersecurity maturity. As cybersecurity continues to mature and be at the top of everyone’s mind, a natural shift has occurred from focusing on meeting regulatory compliance mandates, to involving the business and reducing risks associated with their…

    Read More >>