Events
-
ModernCISO Summit Geneva 2026
-
2/5/26
Research
-
Inside the DPRK Fake IT Workers Network: IP Ranges, Proxies, and Internal Coordination
-
1/5/26
ModernCISO
-
Turn Cybersecurity Into Financial Advantage
-
1/5/26
Careers
Blogs
ModernCISO
KS Research
EN
GER
FRE
Blogs
Advisory Services
OT Security
Artificial Intelligence
Blockchain
CISO
Turn Cybersecurity Into Financial Advantage
Is Your Pentester Wasting Time on Vulnerability Management?
Towards a Human Risk Framework: A Strategic Blueprint for CISOs
See All ModernCISO Blogs
Basics
MDR
EDR
XDR
Incident Response
CISO
What is Penetration Testing?
Red Team vs Penetration Testing: What’s the Difference?
Red Team vs Blue Team: What’s the Difference?
See All ModernCISO Basics
Guides
Advisory Services
MDR
Risk Management
Zero Trust
Cybersecurity
The ModernCISO Guide to NIS2
The ModernCISO Guide to Zero Trust for Microsoft
The Four-Step Framework for Managing Insider Risk
See All ModernCISO Guides
Subscribe
Fresh Thinking
for Security Leaders
Powered by Kudelski Security
latest modernciso blogs
Advisory Services
1/5/26
·
Mihir Mistry
Turn Cybersecurity Into Financial Advantage
Penetration Testing
1/5/26
·
Josh Hofer
Is Your Pentester Wasting Time on Vulnerability Management?
Advisory Services
12/29/25
·
Johannes Schaetz
Towards a Human Risk Framework: A Strategic Blueprint for CISOs
Advisory Services
12/12/25
·
Johannes Schaetz
Tools, Traps, and Trade-offs: Technology’s Double-Edged Role in Human Risk Management
See All ModernCISO Blogs
latest modernciso basics
Penetration Testing
3/19/25
·
Kudelski Security Team
What is Penetration Testing?
Penetration Testing
3/19/25
·
Kudelski Security Team
Red Team vs Penetration Testing: What’s the Difference?
Penetration Testing
3/19/25
·
Kudelski Security Team
Red Team vs Blue Team: What’s the Difference?
XDR
7/29/24
·
Kudelski Security Team
How Do XDR Solutions Make For A More Cost-Efficient Organization?
See All ModernCISO Basics
latest modernciso guides
Advisory Services
The ModernCISO Guide to NIS2
Advisory Services
The ModernCISO Guide to Zero Trust for Microsoft
Advisory Services
The Four-Step Framework for Managing Insider Risk
Managed Detection & Response
How to Set Security Program Priorities that Enhance Cyber Resilience
See All ModernCISO Guides