Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Advisory Services
    Bookmark
    Curious About ISO 27001? Here’s How Kudelski Security Can Help You Assess Readiness—Without Committing to Full Implementation (Yet)
    5 minutes read
    Advisory Services
    Bookmark
    Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
    6 minutes read
    Advisory Services
    Bookmark
    The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
    5 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Blogs

Powered by Kudelski Security
  • Filter by

  • Filter by

Blogs

Cybersecurity
The Trouble with Cybersecurity Awareness Month…
October was Cybersecurity Awareness Month, so, not surprisingly, we see a lot of media coverage about cybersecurity and hear about our clients’ cybersecurity teams focusing on the implementation of best practices. But as October moves to November,
7 minutes read
Cybersecurity
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Zero Trust
Can Zero Trust Be A Business Enabler? It’s All About Perception
It was back in 2017 that the Economist predicted data would replace crude oil as the world’s most valuable resource and that there would be a new “asset-light” economy built on digital rather than physical infrastructures. In hindsight, we could
6 minutes read
Zero Trust
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Security Advisory
How to Integrate Red Teaming in Your Security Program
Introduction – What Red Teaming Is and Why You Should Care As a CISO, you have to ensure your organization's data and infrastructure are as secure as possible against cyber threats and that you are as prepared as possible to respond to the inevitable
7 minutes read
Security Advisory
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Implementing Business Continuity Plans
Why Business Continuity?   Cybersecurity typically looks at confidentiality, integrity and availability of data and the ecosystems around it. Availability is generally considered a basic requirement, as without a fully functional information
8 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
What You Need to Know About the SEC Rules on Cybersecurity Disclosure for Public Companies
In July 2023, the Securities and Exchange Commission (SEC) adopted new disclosure rules for public companies. Long anticipated, the rules set out requirements for the disclosure of cybersecurity incidents and of risk management, strategy, and governance.
8 minutes read
Cybersecurity
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Black Hat
Quick AI Powered Product Questions for Vendor Halls
Black Hat USA is next week, and one prediction I won’t need a crystal ball for is that the vendor hall will be absolutely plastered with “AI-Powered” everything. It’s no secret that machine learning and deep learning approaches have been part of
9 minutes read
Black Hat
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
More than ChatGPT: Privacy and Confidentiality in the Age of LLMs
Much has been made about the privacy and confidentiality issues with ChatGPT. Just take a look at the press for a list of companies prohibiting ChatGPT usage by their employees, but I’d argue there’s an equally if not far more concerning issue
9 minutes read
Artificial Intelligence
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
What You Can’t See: Visualizing and Addressing MITRE ATT&CK Coverage Gaps with Threat Navigator
Imagine you’re safeguarding a fortress in a vast landscape, not knowing from which direction the next attack might come. This scenario is not too different from the challenges organizations face in the cybersecurity landscape today. In this blog post,
9 minutes read
Managed Detection and Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
From ChatGPT to Microsoft Copilot – Bridging the AI Security Divide
With the recent developments in AI-powered assistants and LLMs, such as ChatGPT and Bing, and mainstream acceptance in the enterprise environment growing with the launch of Microsoft Copilot, an analysis of security – the real cybersecurity risks vs
11 minutes read
Artificial Intelligence
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Misconceptions and Realities of ChatGPT and Cybersecurity
Headlines about ChatGPT and the updated GPT-4 are everywhere. Even with new updates, these models still hallucinate, and unfortunately, so do people writing articles about this technology. There is quite a bit of circular reporting on this topic
13 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
“I’m a New Security Leader and My Business Has Been Breached. What Next?” An Eight-Step Guide to Managing a Cyber-Attack for the First Time.
It comes as no surprise to anyone who follows industry news that reports of cybercrime are increasing. While no security leader ever gets ‘used’ to being breached, the first time it happens is especially daunting. This is a guide put together for
8 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
Our Top Cybersecurity Predictions for 2023
It’s the time of year when the industry begins making their top cybersecurity predictions for the year ahead. Gartner, among others, recently released their top 8 cybersecurity predictions for 2023, writing that supply chain and geopolitical issues
6 minutes read
Cybersecurity Trends
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
6 Steps to Effective Data Security
In this blog post, we’ll identify where today’s data security programs often fail and look at six steps to effective data security. These cover everything from product definition, minimal viable discovery, and services, to telemetrics, metrics as
8 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Getting Started with Cyber Risk Quantification and Decisioning
Over the last few years, there has been increasing interest by CISOs and business leaders in cybersecurity risk quantification. Many of the CISOs we are working with are keen to connect security risk to the language of business. In this article, Graeme
8 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
  • prev page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • next page

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub