Kudelski Security Resource Center
Welcome to our Resource Center. Here you’ll find brochures, data sheets, and videos covering our cybersecurity services and solutions. Search the library according to category and topic
18 Results
Research Reports, Strategic Briefing
Cyber Business Executive Research: Security Leadership Talent Gap
Read the report to understand the changing CISO roles and responsibilities and the strategic areas you should focus on to address the talent gap.
Research Reports, Videos
CurveBall: Microsoft Windows CryptoAPI Spoofing Vulnerability Webcast
Today, we’ll be talking about CurveBall, a Microsoft Windows cryptographic API vulnerability.
Reference Architecture, Research Reports
Cloud Security Reference Architecture
Learn to gauge cloud risk and assess the capabilities of existing security technologies for cloud environments.
Reference Architecture, Research Reports
IoT Security Reference Architecture
Kudelski Security's IoT Security Reference Architecture is a practical guide to help CISOs and other security leaders better secure IoT in their enterprise environment.
Research Reports, Videos
Kudelski Security’s Client Advisory Council
A partnership between CISOs and their board of directors is crucial. The effectiveness of any company’s security program depends on it; the endorsement of the ultimate decision-makers will greatly increase its chances of success.
Research Reports, Videos
IoT Security Reference Architecture
Kudelski Security's latest Reference Architecture is a practical guide to help CISOs and other security leaders better secure IoT in their enterprise environment.
Research Reports, Strategic Briefing
Cyber Executive Research: Cyber Board Communication
This executive research gives recommendations to help facilitate effective board communications and engaging board presentations.
Research Reports, White Paper
Operational Technology: The Next Cyber Battlefront
Critical infrastructure is vital to the functioning of modern societies and economies. But what happens when infrastructure IT systems fall victim to natural disasters, physical incidents, or cyber attacks?