Events
-
Evolution of IT/OT SOC's (US Session)
-
5/7/26
Research
-
No Zero-Days Needed: How Five Hygiene Failures Handed Ransomware Operators the Keys
-
4/24/26
ModernCISO
-
A Reasoned Take On Mythos For Security Leaders
-
4/21/26
Careers
Blogs
ModernCISO
KS Research
EN
GER
FRE
Blogs
Advisory Services
OT Security
Artificial Intelligence
Blockchain
CISO
A Reasoned Take On Mythos For Security Leaders
From SOAR to AI Agents: Rethinking Security Automation Through a CISO’s Risk Lens
The 90-Day RBVM Rhythm: How High Performers Keep Momentum
See All ModernCISO Blogs
Basics
MDR
EDR
XDR
Incident Response
CISO
What is Penetration Testing?
Red Team vs Penetration Testing: What’s the Difference?
Red Team vs Blue Team: What’s the Difference?
See All ModernCISO Basics
Guides
Advisory Services
MDR
Risk Management
Zero Trust
Cybersecurity
The ModernCISO Guide to NIS2
The ModernCISO Guide to Zero Trust for Microsoft
The Four-Step Framework for Managing Insider Risk
See All ModernCISO Guides
Subscribe
ModernCISO Blogs
Powered by Kudelski Security
All Authors
Alyssa Fleck
Angela Marafino
Angelos Charogiannis
Aurore Watts
James Phillips
Jan Knoops
Jean-Sébastien Nahon
Joo Yeon Cho
Kudelski Security Team
Marc Schlaeppi
Michael Robbins
Milana Vladimirova
Nathan Hamiel
Nathan Shock
Olivier Vareilhes
Paul Johnson
Romain Aviolat
Ron Frederick
Sanda Haas Würmli
Sharon Reynolds
Terry Vogelsang
All Topics
Advisory Services
Application Security
Artificial Intelligence
Black Hat
Blockchain
CISO
Cloud Security
Cryptography
CTEM
Cybersecurity
Incident Response
Managed Detection & Response
Microsoft Security
Operational Technology
OT Security
Penetration Testing
Ransomware
RBVM
Security Advisory
Trends & Insights
Zero Trust
Nathan Hamiel
Renaud Cona
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Javier Quintela
Kudelski Security Team
Mihir Mistry
Josh Hofer
Johannes Schaetz
Johannes Schaetz
Andrius Liepinaitis
Andrius Liepinaitis
Johannes Schaetz
Andrius Liepinaitis
Johannes Schaetz
Andrius Liepinaitis
Johannes Schaetz
Marcel Baschisada
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Joo Yeon Cho
Kudelski Security Team
Joo Yeon Cho
Jean-Sébastien Nahon
Sanda Haas Würmli
Kudelski Security Team
Aurore Watts
Jean-Sébastien Nahon
Aurore Watts
Joo Yeon Cho
Marc Schlaeppi
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Nathan Hamiel
Nathan Hamiel
Kudelski Security Team
Paul Johnson
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Marc Schlaeppi
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Sharon Reynolds
Kudelski Security Team
Jan Knoops
Angelos Charogiannis
Kudelski Security Team
Alyssa Fleck
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Jean-Sébastien Nahon
Ron Frederick
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Nathan Hamiel
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Romain Aviolat
Jean-Sébastien Nahon
Nathan Shock
Terry Vogelsang
Kudelski Security Team
Kudelski Security Team
Nathan Hamiel
Kudelski Security Team
Kudelski Security Team
Nathan Hamiel
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Nathan Hamiel
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Kudelski Security Team
Artificial Intelligence
Artificial Intelligence
RBVM
RBVM
Risk Management
Cybersecurity
Artificial Intelligence
Cloud Security
Advisory Services
Penetration Testing
Artificial Intelligence
Advisory Services
Incident Response
Incident Response
Advisory Services
Incident Response
Advisory Services
Incident Response
Advisory Services
Advisory Services
Advisory Services
RBVM
CTEM
Blockchain
Advisory Services
Cryptography
Blockchain
Artificial Intelligence
Managed Detection & Response
Advisory Services
Advisory Services
Advisory Services
Blockchain
Ransomware
Cybersecurity
Application Security
Blockchain
Managed Detection & Response
Artificial Intelligence
Artificial Intelligence
Advisory Services
Advisory Services
Operational Technology
Cryptography
Cybersecurity
Cybersecurity
Incident Response
Managed Detection & Response
Trends & Insights
Managed Detection & Response
CISO
Artificial Intelligence
Advisory Services
Cybersecurity
CISO
Artificial Intelligence
Cloud Security
Trends & Insights
Cybersecurity
Cybersecurity
Cloud Security
Incident Response
Incident Response
Advisory Services
Advisory Services
Ransomware
OT Security
CISO
Advisory Services
Managed Detection & Response
CISO
Trends & Insights
OT Security
Artificial Intelligence
Artificial Intelligence
Advisory Services
Security Advisory
Advisory Services
Cloud Security
Black Hat
Trends & Insights
Zero Trust
Advisory Services
Trends & Insights
Incident Response
Penetration Testing
Microsoft Security
Incident Response
OT Security
Artificial Intelligence
Artificial Intelligence
OT Security
Security Advisory
OT Security
Application Security
OT Security
CISO
Microsoft Security
CISO
Cybersecurity
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Advisory Services
7/28/25
·
Kudelski Security Team
Beyond the Boardroom: How CISOs Can Translate Cybersecurity Metrics into Business Value
Cryptography
7/18/25
·
Joo Yeon Cho
Quantum-Proof Your Future: Navigating Certification for Post-Quantum Cryptograph
Blockchain
7/1/25
·
Jean-Sébastien Nahon
Why Blockchain Isn’t Secure by Default: Common Myths & Real Risks
Artificial Intelligence
6/26/25
·
Sanda Haas Würmli
The AI Crimewave: What Every CISO Needs to Know Now
Managed Detection & Response
6/2/25
·
Kudelski Security Team
Why Your Microsoft Security Stack Isn’t Enough on Its Own
Advisory Services
5/20/25
·
Aurore Watts
Curious About ISO 27001? Here’s How Kudelski Security Can Help You Assess Readiness—Without Committing to Full Implementation (Yet)
Advisory Services
4/23/25
·
Jean-Sébastien Nahon
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Advisory Services
4/14/25
·
Aurore Watts
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Blockchain
4/8/25
·
Joo Yeon Cho
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Ransomware
3/10/25
·
Marc Schlaeppi
The Future of Ransomware Defense: Proactive Strategies for Mitigating Emerging Threats
Cybersecurity
3/6/25
·
Kudelski Security Team
International Women’s Day: Leading with Confidence in Cybersecurity
Advisory Services
2/12/25
·
Kudelski Security Team
Maturity Is a Journey, Not a Destination
Previous
Load More
12
/
120