Blog posts by Alexei Balaganski

Blog

This Is Why We Can’t Have Nice Things

I had no intention to write any blog posts during the holidays or, God forbid, do any predictions for the next year (look how relevant last year’s predictions turned out to be). However, an interesting story involving Ticketmaster, a large American ticket sales company, has caught my eye and made me think once again about my career in cybersecurity. The whole story goes all the way back to 2013, but the details have only recently been unsealed after the company has entered into a plea agreement and agreed to pay a $10 million fine for illegal access to a competitor’s...

Blog

MySQL Analytics Engine: Almost Too Good to Be True?

Whether you’re a fan of MySQL or not, you cannot dispute the fact that it is the world’s most popular open-source database by a large margin (incidentally, it’s also the second most popular database ever, behind only its owner Oracle’s flagship commercial product). 25 years after its inception, MySQL has evolved into an essential and truly ubiquitous component of every web application stack and cloud platform. Even though some database experts might frown upon it for lacking “enterprise capabilities”, it is widely used by the largest enterprises around...

Blog

Cybersecurity Awareness – Are We Doing Enough?

It’s October and it means that we are having the European Cybersecurity Month again. ECSM is the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organizations. To be completely honest, I do not remember it being much of a thing in previous years, but apparently, in 2020, cybersecurity awareness is much more important for the European Commission and not without, ahem, a very big reason. I have always had mixed feelings about the whole notion of “awareness”. On one hand, raising awareness is basically what we analysts...

Blog

The Story of Edge AI

Whether you are a firm believer in the bright future of Artificial Intelligence or somewhat of a skeptic like me – you simply cannot ignore the great strides AI technologies have made in recent years. Intelligent products powered by machine learning are everywhere: from chatbots to autonomous vehicles, from predicting consumer behavior and detecting financial fraud to cancer diagnostics and crop harvesting. There is however a major factor limiting even further applications of AI and ML in almost any industry: AI algorithms are very computationally intensive and until quite recently,...

Blog

Oracle Delivers on Earlier Cloud Promises

Back in February (oh, how time flies! Just to think that it was right before the  beginning of the  COVID-19 pandemic…) I wrote a blog post looking at Oracle’s ambitious plans for developing  its  cloud strategy and expanding  its  worldwide infrastructure footprint. The post was titled “ Will 2020 Be the Year of Oracle Cloud? ” and just five months later the company has already demonstrated that it  does not just  finally  have   a  promising  vision for Oracle Cloud, but also a...

Blog

The Latest Twitter “Hack” Raises Inconvenient Questions

It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and Jeff Bezos, as well as companies like Apple or Uber, were suddenly promoting a cryptocurrency scam. At first, they referred to a specific crypto-related website, but as it was quickly taken down, the hackers switched to spreading multiple Bitcoin addresses, asking people to send money to them to get a double amount of their investment back. Even though this type of scam is nothing new and...

Blog

Cybersecurity of Tomorrow: Delivered Entirely From the Cloud

As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate visibility, threat protection, and scalability, nor can they offer convenience and productivity for users on the go. In a crisis, a cybersecurity strategy is a matter of survival The previous paragraph summarizes what KuppingerCole, along with many other industry experts, has been...


KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00