Events
-
ModernCISO Summit Paris | Novembre 2025
-
9/20/25
Research
-
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
-
8/19/25
ModernCISO
-
Strengthen Security Before It Breaks: Making CTEM Work for You
-
8/31/25
Careers
Blogs
ModernCISO
KS Research
EN
GER
FRE
Blogs
Advisory Services
OT Security
Artificial Intelligence
Blockchain
CISO
Strengthen Security Before It Breaks: Making CTEM Work for You
Maximal Extractable Value (MEV): The Hidden Force Shaping Blockchain Security
Beyond the Boardroom: How CISOs Can Translate Cybersecurity Metrics into Business Value
See All ModernCISO Blogs
Basics
MDR
EDR
XDR
Incident Response
CISO
What is Penetration Testing?
Red Team vs Penetration Testing: What’s the Difference?
Red Team vs Blue Team: What’s the Difference?
See All ModernCISO Basics
Guides
Advisory Services
MDR
Risk Management
Zero Trust
Cybersecurity
The ModernCISO Guide to NIS2
The ModernCISO Guide to Zero Trust for Microsoft
The Four-Step Framework for Managing Insider Risk
See All ModernCISO Guides
Subscribe
ModernCISO Minute
Powered by Kudelski Security
Risk Management
August 8, 2024
·
Risk Management
Leveling Up Vulnerability Management
Managed Detection & Response
July 31, 2024
·
Managed Detection & Response
What to Expect from an MDR Provider
Microsoft Security
July 24, 2024
·
Microsoft Security
Strategic Platform Security
Advisory Services
July 19, 2024
·
Advisory Services
SOAR
Cybersecurity
July 12, 2024
·
Cybersecurity
Cyber Threat Intelligence
Microsoft Security
July 3, 2024
·
Microsoft Security
Technical Debt
Cybersecurity
June 19, 2024
·
Cybersecurity
Security Awareness Training
Managed Detection & Response
June 12, 2024
·
Managed Detection & Response
Challenges of the MDR Model
Risk Management
June 5, 2024
·
Risk Management
Mistakes in Vulnerability Management
Cybersecurity
February 22, 2023
·
Cybersecurity
Building a Security Operations Center
Cybersecurity
October 31, 2022
·
Cybersecurity
Technology Rationalization