Table of Contents
- 1 Interview with Kudelski Security
- 2 This might also interest you
- 3 More articles about Kudelski Security
- 4 More articles about Kudelski Security
- 5 More articles on cyber security
- 6 More articles on cyber security solutions
- 7 More articles on cybersecurity/cybersecurity
- 8 More articles on managed security
- 9 **The article highlights the increasing importance of MSSPs. In what ways can MSSPs demonstrate their commitment to ethical practices and data privacy, building trust with clients who are entrusting them with critical cybersecurity responsibilities?**
Interview with Kudelski Security
November 26, 2024, 11:00 am | Interview: Diana Artist
Ransomware, phishing and vulnerabilities in the supply chain currently represent cyber threats. Olivier Vareilhes from Kudelski explains in an interview how companies can prepare themselves against these dangers using AI-supported security, identity protection and zero trust approaches.
connect professional: What threats does Kudelski Security see for cybersecurity companies in the EMEA region?
Olivier Vareilhes: The biggest threat currently facing companies is the growing threat of ransomware. These attacks often occur through phishing, where criminals attempt to gain access to identities and networks. What is particularly worrying is that the attack methods are becoming increasingly sophisticated through the use of artificial intelligence (AI). Phishing attacks, for example, are now designed to be so deceptively realistic that they can hardly be distinguished from legitimate emails.
Olivier Vareilhes, General Manager EMEA at Kudelski Security: “Supply chain attacks are increasing. Even when large companies are well insured, the risk remains from small, less protected suppliers – a danger that many underestimate.”
Another major risk is supply chain attacks: Many companies are convinced that they are well protected by their own investments, but underestimate the danger posed by less protected suppliers and subcontractors. Even small security gaps among business partners can lead to significant security problems, which is particularly threatening in industries with highly integrated supply chains, such as manufacturing.
connect professional: Do you see new security risks in moving to the cloud?
Varieties: Absolutely. Many companies use cloud services, but often have not made comprehensive security adjustments. The cloud requires a different security strategy than on-premises systems, and simply migrating the previous architecture poses security risks. Here, too, there is a risk that threat actors will exploit vulnerabilities in the cloud architecture that has not been adequately secured. It is critical that as organizations transition to the cloud, they also identify and secure security vulnerabilities in the new environment.
connect professional: Which groups are behind these attacks?
Varieties: Basically, there are three groups of actors: criminals who want to make financial gains, state actors who often target critical infrastructure and pursue political goals, and activists who fight against specific companies or ideologies. Cybercriminals often act particularly dynamically because they are strongly motivated by financial incentives and are constantly developing new attack strategies. Political actors and activists are also increasingly relying on digital attack methods to destabilize companies and countries or to create public attention for their concerns.
“Cybersecurity is hardly possible without EDR solutions. We observe that around 80 percent of attacks could be prevented using EDR alone. Today it is a basic requirement to protect yourself effectively.” |
---|
connect professional: What strategies or technologies does Kudelski Security recommend to combat such threats?
Varieties: An essential component is the use of EDR solutions (Endpoint Detection and Response), which can ward off around 80 percent of attacks. Comprehensive identity protection is also crucial, as attacks are often made possible by identity theft. A combination of EDR, identity protection and zero trust strategies provides a solid foundation. Zero Trust enables strict access control where users and systems are continuously checked. Together, these measures provide a high level of security and reduce the risk of attackers infiltrating systems unnoticed. Ultimately, a comprehensive XDR platform enables a holistic view of the attack chain and uncovers malicious, stealthy behavior.
connect professional: Kudelski Security recently opened a new service portfolio presented1. What is it?
Varieties: Our new portfolio is aimed at companies that use AI applications. Although AI is the core business, we have found that companies often do not take the necessary security precautions when deploying AI solutions. Caution is particularly advised with free models, as entered data is often used by providers to optimize the AI and can therefore potentially be made publicly accessible.
We offer a consulting portfolio that helps companies design their AI applications securely and only use data to the extent necessary. We also support our customers in complying with the new EU AI Act, which sets strict requirements for the safe use of AI technologies.
“With our new service portfolio, we support companies in using AI applications safely and meeting the requirements of the EU AI law. Because security risks when using AI are often overlooked.” |
---|
connect professional: To what extent does Kudelski Security support companies in complying with EU regulations such as DORA or NIS2?
Varieties: We offer comprehensive consulting services to ensure companies meet the requirements of the new EU regulations. These include, among others, the Digital Operational Resilience Act (DORA) and the Cyber Resilience Act (CRA), which aims to increase the resilience of IT systems. An existing ISO 27001 certification is often sufficient to cover large parts of the regulations. Our consulting teams are able to advise companies individually, taking regional requirements into account.
connect professional: What role do Managed Security Service Providers (MSSP) play in an organization’s cybersecurity strategy?
Varieties: Today it is hard to imagine life without MSSPs. Through specialized teams and advanced technologies, MSSPs provide 24/7 threat monitoring and response. For many companies, it is hardly possible to maintain this type of security operation independently due to the lack of skilled workers. Our analysts attend regular training courses to stay up to date on the latest threats and defense methods. In addition, operating a 24/7 security center is often expensive and difficult to manage for individual companies. With an MSSP, however, security experts are available even on weekends and holidays to immediately ward off potential attacks. This is particularly important because attacks often occur at inopportune times.
connect professional: Are there any further future plans or points on the roadmap at Kudelski Security?
Varieties: Two key areas of focus are the constant review and integration of new technologies and the increased use of AI for automation in our Security Operations Center (SOC). AI helps automate repetitive tasks, reducing the burden on analysts and leading to faster responses.
We are also investigating (and are already using some of it) how deep learning can learn from the behavior of our analysts and, under certain circumstances, apply automated reactions. This allows attacks to be identified more precisely and quickly. However, it is important that our solutions are 100% reliable – we cannot afford mistakes in this area. These new solutions complement, but do not replace, the skills of our human analysts. This allows analysts to concentrate on the quality of the investigations. In the end, the final decision is made by the person.
Read more on the topic
This might also interest you
More articles about Kudelski Security
More articles about Kudelski Security
More articles on cyber security
More articles on cyber security solutions
More articles on cybersecurity/cybersecurity
More articles on managed security
**The article highlights the increasing importance of MSSPs. In what ways can MSSPs demonstrate their commitment to ethical practices and data privacy, building trust with clients who are entrusting them with critical cybersecurity responsibilities?**
This article provides valuable insights from Kudelski Security regarding cybersecurity trends and their offerings. Here are some open-ended questions focusing on the key topics, designed to encourage discussion and different viewpoints:
**Section 1: AI and Cybersecurity**
* The article mentions that security risks when using AI are often overlooked. What specific risks are they referring to, and how prevalent are these risks in current AI deployments?
* How can companies balance the benefits of using AI with the need to mitigate potential security risks? What practical steps can they take?
* Kudelski Security emphasizes the importance of complying with the EU AI law. How does this law differ from other existing regulations, and what unique challenges does it present for organizations?
**Section 2: Compliance and Regulations**
* The article highlights Kudelski Security’s consulting services for regulations like DORA and NIS2. In your experience, what are the biggest challenges companies face when trying to comply with these regulations?
* Do you think having an existing ISO 27001 certification is truly sufficient for covering large parts of DORA and NIS2, or are there additional requirements that companies need to address?
* How can companies ensure their cybersecurity strategies remain adaptable and up-to-date as new regulations and threats emerge?
**Section 3: Role of MSSPs**
* The article argues that MSSPs are “hard to imagine life without” today. Do you agree with this statement? What are the main advantages and disadvantages of relying on an MSSP for cybersecurity?
* How can organizations ensure they choose the right MSSP for their specific needs and industry? What key factors should they consider during the selection process?
* As AI and automation become more prevalent in cybersecurity, what are the potential implications for the role of MSSPs? Will they become more or less relevant in the future?
**Section 4: Future of Kudelski Security**
* Kudelski Security mentions their focus on AI automation in their Security Operations Center (SOC). What are the potential benefits and risks of relying heavily on AI for threat detection and response?
* How does Kudelski Security ensure that AI-driven security solutions remain reliable and avoid making mistakes that could compromise security?
* What other emerging technologies or trends do you see shaping the future of cybersecurity, and how is Kudelski Security preparing to address them?
These open-ended questions aim to delve deeper into the key topics discussed in the article and encourage a thought-provoking discussion about the future of cybersecurity.