Events
-
RECIF 2025
-
9/17/25
Research
-
How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories
-
8/19/25
ModernCISO
-
Strengthen Security Before It Breaks: Making CTEM Work for You
-
8/31/25
Careers
Blogs
ModernCISO
KS Research
EN
GER
FRE
Blogs
Advisory Services
OT Security
Artificial Intelligence
Blockchain
CISO
Strengthen Security Before It Breaks: Making CTEM Work for You
Maximal Extractable Value (MEV): The Hidden Force Shaping Blockchain Security
Beyond the Boardroom: How CISOs Can Translate Cybersecurity Metrics into Business Value
See All ModernCISO Blogs
Basics
MDR
EDR
XDR
Incident Response
CISO
What is Penetration Testing?
Red Team vs Penetration Testing: What’s the Difference?
Red Team vs Blue Team: What’s the Difference?
See All ModernCISO Basics
Guides
Advisory Services
MDR
Risk Management
Zero Trust
Cybersecurity
The ModernCISO Guide to NIS2
The ModernCISO Guide to Zero Trust for Microsoft
The Four-Step Framework for Managing Insider Risk
See All ModernCISO Guides
Subscribe
Our Latest posts about
Advisory Services
Powered by Kudelski Security
Advisory Services
July 28, 2025
·
6 min read
Beyond the Boardroom: How CISOs Can Translate Cybersecurity Metrics into Business Value
Advisory Services
May 20, 2025
·
6 min read
Curious About ISO 27001? Here’s How Kudelski Security Can Help You Assess Readiness—Without Committing to Full Implementation (Yet)
Advisory Services
April 23, 2025
·
6 min read
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Advisory Services
April 14, 2025
·
6 min read
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Advisory Services
July 19, 2024
·
6 min read
SOAR
Advisory Services
October 31, 2023
·
6 min read
The ModernCISO Guide to Zero Trust for Microsoft
Advisory Services
December 27, 2022
·
6 min read
The Four-Step Framework for Managing Insider Risk
Advisory Services
July 19, 2024
·
6 min read
The ModernCISO Guide to NIS2
Advisory Services
July 9, 2022
·
6 min read
Managing & Communicating Cybersecurity Risk and Maturity
Advisory Services
December 13, 2023
·
6 min read
Safeguarding Data in the Cloud: Proven Practices for SaaS Security
Advisory Services
April 8, 2023
·
6 min read
Basic Guide to Cyber Threat Intelligence: What It Is and Why Your Business Needs It
Advisory Services
February 12, 2025
·
6 min read
Maturity Is a Journey, Not a Destination
Advisory Services
January 28, 2025
·
6 min read
The TikTok Ban: A New Era of Tech Geopolitics
Advisory Services
July 22, 2024
·
6 min read
Cyber Threat Intelligence: the Choice Between Outsourcing and an In-House Approach
Advisory Services
December 8, 2022
·
6 min read
6 Steps to Effective Data Security
Advisory Services
November 8, 2022
·
6 min read
Getting Started with Cyber Risk Quantification and Decisioning
Advisory Services
September 2, 2021
·
6 min read
Mitigating Automation Risk with an Automation Impact Audit
Advisory Services
November 27, 2023
·
6 min read
Vulnerability Management: Common Mistakes and Misconceptions
Advisory Services
October 3, 2023
·
6 min read
Implementing Business Continuity Plans
Advisory Services
March 29, 2023
·
6 min read
Misconceptions and Realities of ChatGPT and Cybersecurity