Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Advisory Services
    Bookmark
    Curious About ISO 27001? Here’s How Kudelski Security Can Help You Assess Readiness—Without Committing to Full Implementation (Yet)
    5 minutes read
    Advisory Services
    Bookmark
    Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
    6 minutes read
    Advisory Services
    Bookmark
    The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
    5 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Basics

Powered by Kudelski Security
  • Filter by

  • Filter by

Basics

Not-so-basic breakdowns of what people are talking about in the cybersecurity industry today.
Pentesting
From Theory to Practice: Getting Started with Red Teaming
It seems like everyone is talking about red teaming these days and for good reason. Red teaming can be an incredibly useful exercise for organizations looking to test their threat detection and response capabilities as well as their security maturity as
7 minutes read
Pentesting
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Risk Management
How to Build a Vendor Risk Management Program
Time to update your vendor risk management program? In this article, Graeme Payne, Kudelski Security’s practice leader for strategy, risk, and compliance, covers the four essential areas for consideration in building a robust VRM program.
7 minutes read
Risk Management
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It Cyber threat intelligence programs play a foundational role in protecting modern enterprises from cyberattacks, informing security priorities, data collection and
8 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: Answering the Most Challenging Board Questions
In the first part of this series, I introduced the research on CISO board communications and metrics Kudelski Security performed in collaboration with our Client Advisory Council. The report is available in full here. As with all meaty reports, there’s
5 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: The Good Communication Guide
Cybersecurity incidents are increasing, and with it, the pressure on CISOs to get cybersecurity right. At the heart of this challenge is getting the full support of the board of directors. The board sets the tone for the organization, gives the green
4 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Board Basics: Communication Strategies: Security Benchmarking
Kudelski Security is supported by its Client Advisory Council (CAC) a group of industry CISOs who provide insight and advice on the strategic direction and program priorities of the business. The Client Advisory Council report on Facilitating Cyber Board
4 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud
Pushing Security to the Edge
It’s a fairly simple equation. The rise in remote workers generates a rise in traffic on corporate networks from different locations, which in turn generates the need to rethink network security strategies.  Enter “Secure Access Service Edge”
6 minutes read
Cloud
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
OT Security
IT Strategies You Can Adapt to Secure OT Environments
The convergence of IT/OT means OT environments are no longer “walled off” from the rest of the organization or even the rest of the world. Exposure to cybersecurity threats in these systems is growing, and a successful attack could be extremely
8 minutes read
OT Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Basics: Navigating Your First Year as a New CISO
The first year as a new CISO can be exhilarating and at times downright frightening. You have a lot to prove and minds to win over, but you also have the opportunity to start fresh and make a big impact. Early on, the emphasis is on learning the lay
6 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Basics: Navigating Your First Month as a New CISO
As a new CISO, the single most important thing you can do is to start building the relationships and political capital you’ll need to run your security program. In this article, we’ll share best practices for navigating your first 30 days on the job,
6 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
A Guide to Microsoft Passwordless Authentication
Passwords have long been a daily part of our lives. But in today’s modern, cloud-first world, the use of passwords alone leaves us increasingly more vulnerable to compromise. Large-scale data breaches are being reported more and more frequently in the
5 minutes read
Microsoft Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
A Basic Guide to Crypto Exchange Security
This article is a practical summary of the top five areas, common to all major security standards and frameworks, which crypto exchange companies need to engage with, to protect their platform. Understand Risks and Threats Business Process
11 minutes read
Blockchain
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
CISO Basics: Four Ways to Attract and Retain IT Developers
According to the U.S. Bureau of Labor Statistics, the demand for software developers is set to increase to 22% between 2022 and 2030. This percentage is almost 4% more than the growth of average careers. So, with the rise in qualified personnel, why is
4 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
  • prev page
  • 1
  • 2

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub