• English
    • French
    • German
    • Spanish
  • Blogs
    • ModernCISO
    • Kudelski Security Research
  • Careers
  • Emergency Response
Kudelski Security Kudelski Security
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research
Contact
  • French
  • German
  • Spanish
  • Blogs
  • Basics
  • ModernCISO Minute
  • ModernCISO Guides
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.
  • Services
        • Advisory

          Amplify the effectiveness of your team and resources by partnering with our cybersecurity advisors.

          Learn More

        • Technology Optimization

          Design, build and run an optimal security technology environment with our reference architectures.

          Learn More

        • Managed Security

          Combining advanced fusion capabilities with human expertise to detect and respond to threats faster.

          Learn More

        • Managed Detection and Response

          Customized, rapid threat detection and response services for any environment, 24/7.

          Learn More

        • Emerging Technology Security

          Our multi-disciplinary teams help secure new frontiers for your business and deliver the most valuable commodity of all: trust.

          Learn More

        • Incident Response

          Prepare for cyber attacks with support from our Advisory and MSS teams.

          Learn More

  • Solutions
        • By Capability

          From strategic program management to intensive device testing, we help build world-class cybersecurity programs from the ground up.

          Learn More

        • By Industry

          Building and maintaining powerful cybersecurity programs with a deep understanding of industry-specific threat actors.

          Learn More

        • By Need

          Delivering cutting-edge cybersecurity solutions and services that are tailored to the precise needs and objectives of our enterprise partners.

          Learn More

  • Industries
        • Financial Services

          Protect financial records and ensure compliance with industry-leading threat detection.

          Learn More

        • Government

          Guarantee the security of sensitive assets and data with cutting-edge security capabilities.

          Learn More

        • Manufacturing

          Stay ahead of cyber threats with cost-effective security services and solutions.

          Learn More

        • Healthcare Industry

          Adopt a proactive approach to cybersecurity that better protects IT infrastructure and data.

          Learn More

        • Energy and Utilities

          Build cybersecurity programs that can defend highly complex network architectures.

          Learn More

        • Retail

          Win consumer trust and loyalty by achieving long-term compliance and customer security.

          Learn More

        • Software and Internet Services

          Keep your software and internet services updated and secure to ensure they can withstand sustained cyber attacks.

          Learn More

        • Download the Operational Technology eBook

          Download now

  • Resources & Events
        • Resources
          • All Resources
          • eBooks
          • Reference Architecture
          • Research Reports
          • Webinars
          • Factsheets
        • Events
          • Upcoming Events
        • Knowledge Center
          • Blockchain Report Archive
          • Threat Alert Center
          • Research
          • ModernCISO
  • Partnerships
        • Alliance Partners

          Maintaining a network of strategic partnerships and alliances that promote the industry and bring added value to our clients.

          Learn More

        • Technology Partnerships

          Explore our community of technology partners.

          Learn More

        • Strategic Alliances

          Partner with Kudelksi Security to protect your clients' vital assets with a portfolio of innovative cybersecurity services and solutions.

          Learn More

        • Texas DIR

          Providing statewide leadership and oversight for management of government information and communications technology.

          Learn More

  • Company
        • Why Us?
          • The Kudelski Security Advantage
          • Awards & Accolades
        • About Us
          • Our Story
          • Our Heritage
          • Leadership Team
          • Careers
          • Practice Leaders
          • Certifications
        • News
          • Press Releases
        • Contact Us
          • Locate Us
          • Report an Attack
          • Request an MSS Portal Demo
  • Blogs
    • ModernCISO
    • Kudelski Security Research

Tag: CISO

How CISOs Can Combat “Cybersecurity Complacency”

Share this blog
Back to blogs
Vincent Waart
Senior Director, EMEA Advisory Services
Find out more >>
Other blogs on CISO
How to Become a CISO in the Modern Day
Find out more >>

How CISOs Can Combat “Cybersecurity Complacency”

CISO | 5 minutes read
06/17/2024

Vincent Waart
Senior Director, EMEA Advisory Services
Find out more >>
Other blogs on CISO
Data Security as a Business Enabler
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

Our Top Cybersecurity Predictions for 2023

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on Cybersecurity Trends
Security Models for New Enterprise Perimeter Threats
Find out more >>

Our Top Cybersecurity Predictions for 2023

Cybersecurity Trends | 6 minutes read
01/13/2023

Kudelski Security Team
Other blogs on Cybersecurity Trends
What’s Next in Cybersecurity: Predictions 2022
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

Getting Started with Cyber Risk Quantification and Decisioning

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on Advisory Services
Implementing Business Continuity Plans
Find out more >>

Getting Started with Cyber Risk Quantification and Decisioning

Advisory Services | 8 minutes read
11/08/2022

Kudelski Security Team
Other blogs on Advisory Services
Vulnerability Management: Common Mistakes and Misconceptions
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

What’s Next in Cybersecurity: Predictions 2022

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on Cybersecurity Trends
Security Models for New Enterprise Perimeter Threats
Find out more >>

What’s Next in Cybersecurity: Predictions 2022

Cybersecurity Trends | 6 minutes read
08/26/2022

Kudelski Security Team
Other blogs on Cybersecurity Trends
The Top Actionable Cybersecurity Insights of 2023 and the Direction of Travel for 2024 and Beyond
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

3 Things Modern CISOs Can Do to Reduce the Attack Surface

Share this blog
Back to blogs
Kudelski Security Team

3 Things Modern CISOs Can Do to Reduce the Attack Surface

Penetration Testing | 4 minutes read
10/27/2021

Kudelski Security Team

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

The Importance of a Deputy CISO

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on CISO
As a CISO’s Role Expands, a Holistic Approach is Needed
Find out more >>

The Importance of a Deputy CISO

CISO | 5 minutes read
10/13/2021

Kudelski Security Team
Other blogs on CISO
How CISOs Can Combat “Cybersecurity Complacency”
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

Data Security as a Business Enabler

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on CISO
As a CISO’s Role Expands, a Holistic Approach is Needed
Find out more >>

Data Security as a Business Enabler

CISO | 6 minutes read
06/15/2021

Kudelski Security Team
Other blogs on CISO
As a CISO’s Role Expands, a Holistic Approach is Needed
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

A CISO’s Roadmap for IT/OT Convergence

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on Operational Technology
The Anatomy of an IT/OT Cyber Attack
Find out more >>

A CISO’s Roadmap for IT/OT Convergence

Operational Technology | 6 minutes read
04/26/2021

Kudelski Security Team
Other blogs on Operational Technology
The Critical Infrastructure Cybersecurity Dilemma
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

Closing the Cyber Skills Gap: Why Deputy CISOs Are Critical

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on CISO
How CISOs Can Combat “Cybersecurity Complacency”
Find out more >>

Closing the Cyber Skills Gap: Why Deputy CISOs Are Critical

CISO | 5 minutes read
03/30/2021

Kudelski Security Team
Other blogs on CISO
The Importance of a Deputy CISO
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

The Value of NIST CSF Assessments through an Assessor’s Lens

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on Cybersecurity
International Women’s Day: Leading with Confidence in Cybersecurity
Find out more >>

The Value of NIST CSF Assessments through an Assessor’s Lens

Cybersecurity | 6 minutes read
09/22/2020

Kudelski Security Team
Other blogs on Cybersecurity
International Women’s Day: Leading with Confidence in Cybersecurity
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

How to Become a CISO in the Modern Day

Share this blog
Back to blogs
Kudelski Security Team
Other blogs on CISO
The Importance of a Deputy CISO
Find out more >>

How to Become a CISO in the Modern Day

CISO | 5 minutes read
09/15/2020

Kudelski Security Team
Other blogs on CISO
How CISOs Can Combat “Cybersecurity Complacency”
Find out more >>

Featured blogs

Advisory Services
Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
Introduction: The Silent Threat in Your Codebase Software supply chain attacks have emerged as one of the most effective and stealthy attack vectors in recent years. These threats don’t target your firewall or your perimeter, they target your
6 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Advisory Services
The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
Regulatory compliance is an ongoing challenge for organizations across industries. The landscape of governance, risk, and compliance (GRC) is becoming increasingly complex, with evolving regulations, industry standards, and mounting enforcement actions.
5 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Blockchain
ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
Introduction Zero-Knowledge Machine Learning (ZKML) is an emerging technology that combines zero-knowledge proofs (ZKPs) with machine learning algorithms to enable privacy-preserving machine learning and verifiable AI models. It solves key privacy and
8 minutes read
Share this Blog
Bookmark
Add to CISO Clips & Read Later
Subscribe to the ModernCISO Blog
Subscribe to get regular updates from the ModernCISO Blogs. Insights from our cybersecurity experts are only a few clicks away.

Recent Posts

  • Modern Software Supply Chain Attacks: Trust, Risk, and How to Defend Against Hidden Threats
  • The Growing Need for Outsourcing Compliance Services: How Compliance-as-a-Service (CaaS) Solves GRC Challenges
  • ZKML: Verifiable Machine Learning using Zero-Knowledge Proof
  • The Future of Ransomware Defense: Proactive Strategies for Mitigating Emerging Threats
  • International Women’s Day: Leading with Confidence in Cybersecurity

Recent Comments

    Archives

    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • August 2024
    • July 2024
    • June 2024
    • April 2024
    • February 2024
    • January 2024
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • June 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • August 2022
    • January 2022
    • November 2021
    • October 2021
    • September 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • January 2021
    • December 2020
    • November 2020
    • September 2020
    • July 2020
    • May 2020
    • March 2020
    • May 2019

    Categories

    • Advisory Services
    • Application Security
    • Artificial Intelligence
    • Black Hat
    • Blockchain
    • CISO
    • Cloud
    • Cloud Security
    • Cryptocurrency
    • Cryptography
    • Cybersecurity
    • Cybersecurity Trends
    • Defense
    • Incident Response
    • Kudelski Security
    • Managed Detection and Response
    • Microsoft Security
    • Operational Technology
    • Penetration Testing
    • Quantum
    • Ransomware
    • Security Advisory
    • Zero Trust

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    Get in touch now

    Sign up for our Cybersecurity Newsletter!

    Kudelski Security aggregates the world’s latest news and delivers it to you daily.

    • Services
      • Advisory
      • Technology Optimization
      • Managed Detection and Response
      • Managed Security
      • Applied Security
      • Incident Response
    • Solutions
      • By Capability
      • By Industry
      • By Need
    • About Us
      • Our Story
      • Our Heritage
      • Our Team
      • The Kudelski Security Advantage
      • Partners
      • Careers
      • Press Releases
      • Certifications
    • Resources
      • All Resources
      • Research Blog
      • Modern CISO
    • Company Information
      • Terms of sale
      • Terms & Conditions
      • Privacy Notice
    • Contact Us
      • Locate Us
      • Talk to Our Experts
    © Copyright Kudelski Security 2025. The Cybersecurity Division of the Kudelski Group
    Kudelski Security - LinkedIn Kudelski Security - Twitter Kudelski Security - YouTube Kudelski Security - Facebook Kudelski Security - GitHub