Kudelski Security
FR DE
ModernCiso
  • Blogs
    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Blockchain
    • CISO
    All Blogs
    Advisory Services
    Bookmark
    Curious About ISO 27001? Here’s How Kudelski Security Can Help You Assess Readiness—Without Committing to Full Implementation (Yet)
    5 minutes read
    Advisory Services
    Bookmark
    Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
    6 minutes read
    Advisory Services
    Bookmark
    The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
    5 minutes read
  • ModernCISO Basics
    • Blockchain
    • Cloud
    • Pentesting
    • Network Security
    • Risk Management
    All Basics
    Pentesting
    Bookmark
    What is Penetration Testing?
    6 minutes read
    Pentesting
    Bookmark
    Red Team vs Penetration Testing: What’s the Difference?
    5 minutes read
    Pentesting
    Bookmark
    Red Team vs Blue Team: What’s the Difference?
    6 minutes read
  • ModernCISO Minute
    • Blockchain Cybersecurity
    • Incident Response
    • Digital Transformation
    • Crisis Response Analysis
    All ModernCISO Minutes
    Vulnerability Management
    Bookmark
    Leveling Up Vulnerability Management
    What to Expect
    Bookmark
    What to Expect from an MDR Provider
    Strategic Platform Security
    Bookmark
    The ModernCISO Minute: Strategic Platform Security
  • ModernCISO Guides
    • Advisory
    • Managed Detection and Response
    All Guides
    Advisory
    Bookmark
    The ModernCISO Guide to NIS2
    Advisory
    Bookmark
    The ModernCISO Guide to Zero Trust for Microsoft
    Advisory
    Bookmark
    The Four Step Framework for Managing Insider Risk
  • Subscribe
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Blogs

Powered by Kudelski Security
  • Filter by

  • Filter by

Blogs

Security Advisory
Security Advisory: Kaseya VSA Ransomware Attack
This security advisory was published in July 2021 following reports that a number of managed service providers (MSPs) became victims of a ransomware attack perpetrated by the REvil group through Kaseya VSA. The following is a summary of the attack, the
4 minutes read
Security Advisory
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
The Critical Infrastructure Cybersecurity Dilemma
The Colonial Pipeline and Oldsmar incidents have highlighted the challenge of securing older operational technology systems. This article, originally published in Security Info Watch, explains somehow to prevent and mitigate some of the emerging risks
7 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
Data Security as a Business Enabler
In this five-minute read, we make the case for security to not only participate but lead secure digital transformation in order to protect the business’s most valuable asset: data. Security has evolved since the days when cybersecurity systems were
6 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
How Blockchain Impacts Enterprise Security and Operations
The continued expansion and use of cryptocurrency has always experienced growing pains, as recent events in 2022 show.  But look further back to the major burst of 2018 and you’ll see that crypto has a way of bouncing back—even amid global economic
6 minutes read
Blockchain
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
Blockchain Risks that Impact Crypto Exchange Security
It’s clear from the Axie Infinity Ronin Network breach of 2020, the hack of the DeFi protocol Poly Network in August 2021, and further back – the KuCoin attack of 2020 and the Binance Security  breach in 2019 that blockchain isn’t inherently
4 minutes read
Blockchain
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
Application Security
Is Your Web App Secure Against Shopping Bot Attacks?
Recent headline-making shopping bots may have CISOs asking “Is our business at risk of a targeted bot attack?” and “What can I do to prevent it from happening to us?” Nike and Sony are not the first, nor will they be the last, brands to
6 minutes read
Application Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Managed Detection and Response
4 Roadblocks to Faster Threat Detection & Response and 3 Things You Can Do About It
In this blog on Managed Detection and Response, Kudelski Security's Managed Detection and Response Team discuss four major issues familiar to any security leader who has wrestled with making threat detection and response more efficient. If you want to
9 minutes read
Managed Detection and Response
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
A CISO’s Roadmap for IT/OT Convergence
Hyperconnectivity of OT, ICS and SCADA environments has created an overlap between IT and OT environments, exposing formerly segmented systems to much wider attack surfaces. CISOs operating in newly or soon-to-be converged IT/OT environments, therefore,
6 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity Trends
Security Models for New Enterprise Perimeter Threats
The security industry faced a variety of challenges during these last few years. The pandemic put pressure on security and IT operations and shone a spotlight on underlying issues many organizations were facing in terms of their digital transformation
4 minutes read
Cybersecurity Trends
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
CISO
Closing the Cyber Skills Gap: Why Deputy CISOs Are Critical
In this article, originally published in Cyber Security Magazine, we explain the growing importance of the Deputy CISO in closing the cyber skills gap and advises on eight key competencies every security lieutenant needs to develop. No matter how good
5 minutes read
CISO
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Microsoft Security
Attackers Know Microsoft 365 Better Than You Do
Users have taken to Microsoft Office 365’s tools, but many are unaware of free features that come with their accounts — features that would keep them safe. Organizations have quickly adopted the full-featured set of productivity and collaboration
5 minutes read
Microsoft Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Application Security
6 Signs of Malicious Traffic on Your Web or Mobile App
We sat down with Dan Woods, VP of the Shape Intelligence Center, which is now part of F5 Networks, to talk about how we can best identify malicious traffic on web and mobile applications. This article summarizes six of the primary indicators they look
6 minutes read
Application Security
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Operational Technology
Beyond Compliance: 5 Ways Healthcare Organizations Can Improve Their Cybersecurity Posture
Recent high-profile ransomware attacks on hospitals have once again demonstrated the vital importance of securing healthcare IT infrastructures. When cyberattacks have the potential to cause loss of life, it’s absolutely imperative to understand and
7 minutes read
Operational Technology
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
Cybersecurity
The Value of NIST CSF Assessments through an Assessor’s Lens
In this article: What is NIST CSF? Why use NIST CSF? Incorporating NIST CSF into your cybersecurity program NIST CSF assessments Risk assessments for Covid-19 and beyond What is NIST CSF? NIST CSF is a cybersecurity framework helping
6 minutes read
Cybersecurity
Share this Blog
Share this blog
Bookmark
Add to CISO Clips & Read Later
  • prev page
  • 1
  • 2
  • …
  • 4
  • 5
  • 6
  • next page

Get in touch now

Subscribe to the ModernCISO blog
  • Services
    • Advisory
    • Technology Optimization
    • Managed Detection and Response
    • Managed Security
    • Applied Security
    • Incident Response
  • Solutions
    • By Capability
    • By Industry
    • By Need
  • About Us
    • Our Story
    • Our Heritage
    • Our Team
    • The Kudelski Security Advantage
    • Partners
    • Careers
    • Press Releases
    • Certifications
  • Resources
    • All Resources
    • Research Blog
    • Modern CISO
  • Company Information
    • Terms of sale
    • Terms & Conditions
    • Privacy Notice
  • Contact Us
    • Locate Us
    • Talk to Our Experts
© Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub