Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Advisory Services
    Bookmark
    Curious About ISO 27001? Here’s How Kudelski Security Can Help You Assess Readiness—Without Committing to Full Implementation (Yet)
    5 minutes read
    Advisory Services
    Bookmark
    Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
    6 minutes read
    Advisory Services
    Bookmark
    The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
    5 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Blogs

Powered by Kudelski Security
  • Filter by

  • Filter by

Blogs

Cybersecurity Trends
What’s Next in Cybersecurity: Predictions 2022
Every year, the cybersecurity sector publishes articles on what we can expect to see in the course of the year. This article, published originally in InfoSec on August 8, 2022 by Ali Hadley looks at the predictions Kudelski Security, made at the
6 minutes read
Cybersecurity Trends
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
15 Practical Tips for More Effective Cybersecurity Incident Response
Building an effective cyber incident response plan requires more than having the right tools in place or engaging the right cyber incident response services. As a security leader, you’re responsible for building the right security foundation and
11 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
MITRE ATT&CK & D3FEND: Step-by-Step Guide to Closing Security Visibility Gaps
It’s no secret that cybercrime is on the rise with attacks happening more frequently and for higher and higher profits. Enhancing and advancing our threat detection and response capabilities has never been more crucial. But, as with most things in
11 minutes read
Managed Detection and Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Ransomware
Ransomware Threats Are Here to Stay
Over the past year, security companies have witnessed the massive impact that ransomware attacks like SolarWinds and Kaseya have had on businesses. As businesses play catch up to the tactics used by hackers to deploy malware, even more sophisticated
5 minutes read
Ransomware
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Incident Response
Top 5 Tips for Bolstering Incident Response Readiness
In the first of this two-part series, Olivier Spielmann VP of managed security services EMEA at Kudelski Security discussed the factors that drive the need for a more comprehensive approach to Incident Response. The question of how to prevent
4 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Incident Response
How to Build a Cohesive Approach to Incident Response
In this two-part series, Olivier Spielmann, VP managed security services EMEA at Kudelski Security discusses why incident response needs to widen its scope and what every security leader can do to make it happen. The Importance of Robust Incident
5 minutes read
Incident Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
OT Security Best Practices for the Manufacturing Industry
As manufacturing relies more and more on remote access and automation, cyber hygiene continues to be one of the top challenges in securing manufacturers across the nation. This article aims to address the top security concerns impacting the manufacturing
7 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Penetration Testing
3 Things Modern CISOs Can Do to Reduce the Attack Surface
In this four-minute read, we outline three simple things CISOs and security leaders can do to reduce the modern enterprise attack surface: discovery, contextualization, and response. You can’t secure what you don’t know exists; you can’t hide
4 minutes read
Penetration Testing
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
OT Security: The Time for Remote Access Security is Now
In this article, originally published in Industry Today, Francisco Donoso explores the increasing risk associated with connected critical infrastructure systems and steps security leaders can take to prevent future OT attacks.  OT attacks are on the
6 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
The Importance of a Deputy CISO
Ernie Anderson, Head of Professional Services at Kudelski Security, recently sat down with Security Magazine to talk about the importance of a deputy CISO and why this position is critical to addressing security risk management. The interview
5 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
Security Advisory: Microsoft Reports Vulnerability in Azure Container Instances (ACI)
This security advisory was published in October 2021 in response to Microsoft’s disclosure of a vulnerability affecting Azure Container Instances (ACI) service. The following is a summary of the vulnerability, its impact, and initial recommendations
4 minutes read
Microsoft Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
The Anatomy of an IT/OT Cyber Attack
This article summarizes material from a presentation, “Overcoming Industrial Security Challenges,” held during Kudelski Security’s European Cyber Summit in February 2021. The convergence of IT/OT is upon us, bringing new challenges for both the
7 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
Mitigating Automation Risk with an Automation Impact Audit
The promise of automation is doing more with less, freeing people from repetitive tasks allowing focus on more interesting activities. This claim makes for a great tagline but can fall short in implementation. Automation doesn’t have to include
7 minutes read
Advisory Services
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Artificial Intelligence
How to Prepare For New AI Regulations
Until recently, the regulation of AI was left up to the organizations developing the technology, allowing these organizations to apply their own judgment and ethical guidelines to the products and services they create.  Although this is still widely
9 minutes read
Artificial Intelligence
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
  • prev page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • next page

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub