Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Blockchain
    Bookmark
    Maximal Extractable Value (MEV): The Hidden Force Shaping Blockchain Security
    5 minutes read
    Advisory Services
    Bookmark
    Beyond the Boardroom: How CISOs Can Translate Cybersecurity Metrics into Business Value
    6 minutes read
    Cryptography
    Bookmark
    Quantum-Proof Your Future: Navigating Certification for Post-Quantum Cryptograph
    6 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Blogs

Powered by Kudelski Security
  • Filter by

  • Filter by

Blogs

Operational Technology
Bridging the Gap: Building Resilient Cybersecurity for Operational Technology in Critical Industries
Operational Technology (OT) environments are at a critical juncture. As cyber threats intensify, the convergence of OT and IT ecosystems demands immediate attention from CISOs and C-level executives across manufacturing, energy, healthcare, and
5 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
Choosing a Security Service Provider? Look for Microsoft Intelligent Security Association (MISA) Membership
Is your business a Microsoft shop? Or an organization that’s made extensive investments in Microsoft solutions and is trying to get more value from the Microsoft ecosystem? If so, it makes sense to choose partners with demonstrated expertise in the
5 minutes read
Cybersecurity
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cryptography
NIST Announces New Quantum-Resistant Cryptography Standards
What are the Quantum-Resistant Cryptography Standards of NIST?   In August, the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) finalized the publication of the first encryption algorithm standards designed to
5 minutes read
Cryptography
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Why outsource incident response?
Much like insurance, incident response capabilities are something you need to have, but never want to have to use. But this can make it difficult to know the best approach to take until you’re facing an attack, and by that point it can be difficult to
6 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
NIST CSF 2.0: A brief introduction to the revised Cybersecurity Framework
Regulatory and compliance frameworks are constantly being updated to reflect changes in risk and the evolving threat landscape. Earlier this year, the United States’ National Institute of Standards and Technology (NIST) released a new version of its
7 minutes read
Cybersecurity
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Cybersecurity Trends
HR Has an Important Role to Play in Cybersecurity
Despite eye-catching headlines about the dangers of artificial intelligence and supply-chain vulnerabilities, an organization’s own employees are often still its biggest cybersecurity weakness. Attacks like social engineering and spear-phishing may not
11 minutes read
Cybersecurity Trends
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
As a CISO’s Role Expands, a Holistic Approach is Needed
The job of a CISO has never been easy, but in recent years it’s become particularly complex. Nowadays, a chief information security officer is responsible for everything from signing off on technical plans, through to cultivating a robust security
5 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
As the Threat Landscape Changes, Traditional Cybersecurity Approaches Need to Evolve
Conventional security operations centers (SOCs) face many challenges, such as the global talent gap, the growing volume and complexity of security data, and the need to detect, analyze, and respond more rapidly and with greater precision to threats.
6 minutes read
Managed Detection and Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
Deepfakes, An Ever-Growing Challenge
For security and risk management professionals, the growth of AI-generated deepfakes is a significant concern. By 2026, analysts predict that almost a third of enterprises will find traditional identity verification methods inadequate due to the
6 minutes read
Artificial Intelligence
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Cyber Threat Intelligence: the Choice Between Outsourcing and an In-House Approach
Cyber threat intelligence, the process of gathering information about potential threat actors and their methods, is an important tool that businesses can use to better defend themselves against cyberattacks. The idea is that understanding who potential
8 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
5 Key Questions to Consider When Implementing Amazon Security Lake
A couple of months ago I published an article on Amazon Security Lake, a managed service designed to simplify the collection and management of an ever-increasing amount of security data. As I wrote, it’s a great option for many businesses looking to
6 minutes read
Cybersecurity
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
How CISOs Can Combat “Cybersecurity Complacency”
Breaches are happening more often. In 2023, the number of reported breaches neared 3,000, compromising more than eight million records. And that’s just the ones we know about. There could be an active, undetected attack happening right now that leads
5 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
The New Cybersecurity Challenge: Managing Risks from AI Solution Providers
A recent report from SecurityScorecard suggests that third-party attack vectors continue to be a major security concern. Third-party attacks are reportedly responsible for 29 percent of breaches, and as many as 98 percent of organizations have links with
12 minutes read
Artificial Intelligence
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cloud Security
Embracing the Future with Amazon Security Lake – Why It Matters
What is Amazon Security Lake? In the rapidly evolving landscape of cloud computing, efficient management of security data across both cloud and on-premise environments can be a formidable challenge. Amazon Security Lake, a state-of-the-art managed
4 minutes read
Cloud Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
  • prev page
  • 1
  • 2
  • 3
  • …
  • 5
  • 6
  • next page

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub