16 Results

Reference Architecture, Research Reports
Cloud Security Reference Architecture
Learn to gauge cloud risk and assess the capabilities of existing security technologies for cloud environments.

Research Reports, Videos
IoT Security Reference Architecture
Kudelski Security's latest Reference Architecture is a practical guide to help CISOs and other security leaders better secure IoT in their enterprise environment.

Reference Architecture, Research Reports
IoT Security Reference Architecture
Kudelski Security's IoT Security Reference Architecture is a practical guide to help CISOs and other security leaders better secure IoT in their enterprise environment.

Research Reports, Videos
Kudelski Security’s Client Advisory Council
A partnership between CISOs and their board of directors is crucial. The effectiveness of any company’s security program depends on it; the endorsement of the ultimate decision-makers will greatly increase its chances of success.

Research Reports, Strategic Briefing
Cyber Executive Research: Cyber Board Communication
This executive research gives recommendations to help facilitate effective board communications and engaging board presentations.

Research Reports, White Paper
Operational Technology: The Next Cyber Battlefront
Critical infrastructure is vital to the functioning of modern societies and economies. But what happens when infrastructure IT systems fall victim to natural disasters, physical incidents, or cyber attacks?

Research Reports, Videos
Cloud Security Reference Architecture
Large enterprises across industries are adopting public cloud services to reduce the need for large capital investments in IT infrastructure. In the latest edition of our Reference Architecture series, we cover everything cloud security.

Reference Architecture, Research Reports
Endpoint Reference Architecture
As end users and their endpoints are the growing focus of advanced attacks, more than ever before, organizations need to get endpoint security right. This Endpoint Reference Architecture is based on years of experience in delivering endpoint protection solutions. The paper outlines a wide range of endpoint security activity and related technologies.