Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Advisory Services
    Bookmark
    Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
    6 minutes read
    Advisory Services
    Bookmark
    The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
    5 minutes read
    Blockchain
    Bookmark
    ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
    8 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Basics

Powered by Kudelski Security
  • Filter by

  • Filter by

Basics

Not-so-basic breakdowns of what people are talking about in the cybersecurity industry today.
Pentesting
What is Penetration Testing?
Penetration testing is a simulated cyberattack designed to identify and exploit vulnerabilities in your organization’s IT environment. It’s not just about finding weaknesses but also understanding how attackers might use those vulnerabilities to
6 minutes read
Pentesting
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Pentesting
Red Team vs Penetration Testing: What’s the Difference?
When strengthening your organization’s cybersecurity defenses, there’s no shortage of strategies to consider. Two commonly used approaches—Red Team engagements and penetration testing—play vital roles in identifying and mitigating
5 minutes read
Pentesting
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Pentesting
Red Team vs Blue Team: What’s the Difference?
Cybersecurity is an ongoing battle where the stakes increase with every new threat. Organizations must be prepared to handle an ever-evolving landscape of risks, from opportunistic hackers to highly sophisticated threat actors. For CISOs and C-level
6 minutes read
Pentesting
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
XDR Solutions
How Do XDR Solutions Make For A More Cost-Efficient Organization?
Businesses are always thinking about how they can operate more efficiently, but cybersecurity is an area where it’s unwise to cut corners. Attack surfaces are increasing as systems are moved into the cloud, exposing businesses to an increasing variety
6 minutes read
XDR Solutions
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
XDR Vs MDR Vs EDR
XDR vs MDR vs EDR: What’s the Difference?
Does your organization have adequate protection against cybersecurity attacks? As the threats from hackers evolve – increasing in sophistication, volume, and speed – so must your security solutions and strategy. Any discussion on solutions for
5 minutes read
XDR Vs MDR Vs EDR
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
XDR vs SIEM vs SOAR
What’s the Difference Between SIEM, XDR and SOAR?
When it comes to cybersecurity, there are a lot of acronyms you might come across. EDR, NAC, ZTNA, DLP—the list goes on. However, some will be much more critical to your business than others, and in this blog, we’re going to take a closer look at
5 minutes read
XDR vs SIEM vs SOAR
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Next-Generation EDR
Next Generation EDR: How to Maximize its Value
For many years, Endpoint Detection and Response (EDR) solutions were considered to be the foundation of an effective cybersecurity strategy. On one level, this makes total sense. Afterall, it’s estimated that endpoints—physical devices connected
5 minutes read
Next-Generation EDR
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
MDR vs XDR
MDR vs XDR: Everything You Need to Know
Extended Detection and Response (XDR) is a popular topic in the cybersecurity sector right now. Cynics may say that Sales will put an X in front of anything to try and give it the edge. But in this case, X really does stand for ‘eXtended’, so it’s
7 minutes read
MDR vs XDR
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
What Is XDR
Everything You Need To Know About XDR
As digital infrastructure becomes the backbone of modern business, the sophistication and frequency of cyber threats have escalated, making advanced security measures a necessity. These digital infrastructures and remote working trends have expanded the
7 minutes read
What Is XDR
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
Drawn by their convenience, scalability, and cost-effectiveness, today’s businesses are taking advantage of Software-as-a-Service (SaaS) applications more and more often. The global SaaS market is forecast to see an impressive 18% compound annual
8 minutes read
Advisory
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
operational technology
Make Buildings Work Smarter, Not Harder
A typical office environment looks significantly different from a few years ago (and no, this is not another “effects of the pandemic” story). In this case the difference-maker is building automation, which has become more widely embraced for
5 minutes read
operational technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Zero Trust
Why A New Approach to Zero Trust Architecture Matters to Your Networks
Zero Trust Starts with 100 Percent Mindset There’s nothing new to say when it comes to zero trust security, at least in terms of tactics. Many of the most commonly deployed methods have been around for decades: the least privilege principle,
6 minutes read
Zero Trust
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Dealing with a cyber-attack? Six common pitfalls companies should avoid when handling a security crisis
Managing a cyber crisis is one of the most challenging and stressful aspects of a CISO’s job. Aside from the actual challenge and stress of trying to handle a security incident and help your business successfully recover and rebound, far too many
7 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Is my company ready to handle a cyber-attack? Three tips for security leaders to best prepare for and mitigate ongoing security risks
It should be no secret by now that security threat actors constantly evolve their tactics to keep up with new security measures. This means that organizations also need to continually update their efforts to ensure a strong security posture to protect
5 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Is your business dealing with a cybersecurity attack? Here are the five most important steps security leaders and boards must take when dealing with a cyber-attack
As cyber-attacks continue to hit businesses of all sizes, we know that both CISOs and boards struggle during what is one of the most stressful situations they experience. While there’s no one-size-fits-all plan that addresses every organization and
7 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
  • 1
  • 2
  • next page

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub