KuppingerCole Blog

Blog

Google Cloud Advances Security Capabilities by Acquiring SOAR Vendor Siemplify

Yesterday, Google has announced that it has acquired Siemplify , a well-known provider of security orchestration, automation and response (SOAR) solutions, for an undisclosed amount. The stated strategic goal of this acquisition is to “change the rules on how organizations hunt, detect, and respond to threats”. The SOAR capabilities of the Siemplify platform will be integrated into Google’s own Chronicle security analytics platform to provide even better visibility and productivity for security analysts. Now, at the first glance, one could simply ask:...

Blog

The Future of Authentication - Passwordless

Single factor authentication like passwords is considered bad practice. Passwordless authentication, done right, is not only more secure but also more convenient. Learn more about the increasing demand, regulations as well as use cases. Martin Kuppinger enjoyed a delightful conversation with Felix Magedanz from Hanko at EIC 2021 about the future of authentication. Tune in to learn more about the future of multifactor authentication.

Blog

Log4j – How Well Did You Perform?

Over the past few weeks since this vulnerability was made public much has been written by many on what your organization should do about it.  This is not the end of the story; Apache has already released 3 patches for related vulnerabilities, and you need to be ready for the next one when it arrives. With the beginning of 2022 now is the time to step back and review how well your organization met the challenges that this posed.  What will your new year’s resolutions be? In this blog, I will outline some of the questions that you should ask yourself.  How well did...

Blog

Predictions for 2022: Decentralized Technologies

KuppingerCole Analysts pay close attention to all topics at the intersection of identity and security. Decentralized technologies often cross paths with these domains and, since it is a dynamic and potentially disruptive influence on “business as usual”, we have compiled a few predictions about developments in 2022: The decentralized identity market segment will continue to grow: Decentralized identity solutions are one of the strongest use cases with solutions already on the market. There have been some interesting acquisitions , partnerships , and investments...

Blog

How to Grant Access Right

Find out about the importance of context for Identity Risk Management.  Watch the insightful interview Martin Kuppinger had with David Pignolet from SecZetta on the EIC 2021.

Blog

Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity

Avast, a cybersecurity and privacy company, announced on December 9 th 2021 their intent to acquire Evernym. Founded in 1988 in Prague, Czech Republic, Avast focuses both on meeting both consumer and enterprise use cases. On the enterprise side it offers endpoint protection such as patch management, internet/email/web gateway, and content filtering. For consumers, Avast provides a range of security protections and privacy measures for individual devices. Evernym was founded in 2013 in Salt Lake City, UT, USA. It provides blockchain-based decentralized identity solutions that...

Navigator

OT and IoT Security

Cybersecurity has traditionally focused on Information Technology (IT) not Operational Technology (OT) for several reasons. First, unlike IT that is used for administrative operations, OT or the hardware and software that is used to manage industrial operations was not connected to any network. Second, many of the tools were mechanical. Third, those tools with digital controls used closed, proprietary protocols. Fourth, OT commonly and historically is organizationally segregated from IT. However, things have changed, and as a result OT needs to be given the same security consideration as...

Blog

Stop attackers enjoying a pick ‘n’ mix attack surface

We know that the way forward for business IT is to use multi-hybrid architectures for long term agility of operations. Such architectures will include multiple clouds for new services, on-prem stacks, edge devices, OT integration and much more. But while the need for multi-hybrid is clear, the resulting complexity of ad hoc deployment of multi-hybrid architectures can lead to serious security holes. Unmanaged complexity will invariably result in an enlarged attack surface that will encourage attackers to take a pick and mix approach to find and exploit vulnerabilities within your...

Navigator

AI in Cybersecurity

Although we are still a long way from machines being able to react to situations in an intelligent, human way, Artificial Intelligence (AI) technologies have finally matured to the point where AI-supported machines and computer systems are able to complete tasks they have been trained to do. AI-based systems are also able to “learn” or self-correct to get better at the task they have been trained to do. This ability to improve is commonly known as “machine learning” and is often what technology vendors call AI, but it is really just one form or element of AI....

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00