Blog posts by Alexei Balaganski

Blog

The Glorious Return of the Albanian Virus

When I first read about the newly discovered kind of OS X and iOS malware called XcodeGhost , quite frankly, the first thing that came to my mind was: “That’s the Albanian virus!” In case you don’t remember the original reference, here’s what it looks like: I can vividly imagine a conversation among hackers, which would go like this: - Why do we have to spend so much effort on planting our malware on user devices? Wouldn’t it be great if someone would do it for us? - Ha-ha, do you mean the Albanian virus? Wait a second, I’ve got an...

Blog

Windows 10: new anti-malware features and challenges

Offering Windows 10 as a free upgrade was definitely a smart marketing decision for Microsoft. Everyone is talking about the new Windows and everyone is eager to try it. Many of my friends and colleagues have already installed it , so I didn’t hesitate long myself and upgraded my desktop and laptop at the first opportunity. Overall, the upgrade experience has been quite smooth. I’m still not sure whether I find all visual changes in Windows 10 positive, but hey, nothing beats free beer! I also realize that much more has been changed “under the hood”; including...

Blog

Amazon enters another market with their API Gateway

What a surprising coincidence: on the same day we were preparing our Leadership Compass on API Security Management for publication, Amazon has announced their own managed service for creating, publishing and securing APIs – Amazon API Gateway . Well, it’s already too late to make changes in our Leadership Compass, but the new service is still worth having a look, hence this blog post. Typically for Amazon, the solution is fully managed and based on AWS cloud infrastructure, meaning that there is no need to set up any physical or virtual machines or configure resources....

Blog

Why Cybersecurity and Politics Just Don’t Mix Well

With the number of high-profile security breaches growing rapidly, more and more large corporations , media outlets and even government organizations are falling victim to hacking attacks. These attacks are almost always widely publicized, adding insult to already substantial injury for the victims. It’s no surprise that the recent news and developments in the field of cybersecurity are now closely followed and discussed not just by IT experts, but by the general public around the world. Inevitably, just like any other sensational topic, cybersecurity has attracted politicians....

Blog

Life Management Platforms: Players, Technologies, Standards

When KuppingerCole outlined the concept of Life Management Platforms several years ago, the perspective of numerous completely new business models based on user-centric management of personal data may have seemed a bit too farfetched to some. Although the very idea of customers being in control of their digital lives has been actively promoted for years by the efforts of ProjectVRM and although even back then the public demand for privacy was already strong , the interest in the topic was still largely academic. Quite a lot has changed during these years. Explosive growth of mobile...

Blog

The New Meaning of “Hacking your TV”

After a long list of high-profile security breaches that culminated in the widely publicized Sony Pictures Entertainment hack last November, everyone has gradually become used to this type of news. If anything, they only confirm the fact that security experts have known for years: the struggle between hackers and corporate security teams is fundamentally asymmetrical. Regardless of its size and budgets, no company is safe from such attacks simply because a security team has to cover all possible attack vectors, and a hacker needs just a single overlooked one. Another important factor is...

Blog

De-Mail: Now with End-to-end Encryption?

In case you don’t know (and unless you live in Germany, you most probably don’t), De-Mail is an electronic communications service maintained by several German providers in accordance with German E-Government initiative and the De-Mail law declaring this as a secure form of communication. The purpose of the service is to complement traditional postal mail for the exchange of legal documents between citizens, businesses and government organizations. Ever since its original introduction in 2012, De-Mail has been struggling to gain acceptance of German public. According to...

Blog

Internet of Opportunities

For a topic so ubiquitous, so potentially disruptive and so overhyped in the media in the recent couple of years, the concept of the Internet of Things (IoT) is surprisingly difficult to describe. Although the term itself has appeared in the media nearly a decade ago, there is still no universally agreed definition of what IoT actually is. This, by the way, is a trait it shares with its older cousin, the Cloud. On the very basic level, however, it should be possible to define IoT as a network of physical objects (“things”) capable of interacting and exchanging information...

Blog

The Great SIM Heist and Other News from NSA

Even almost two years after Edward Snowden made off with a cache of secret NSA documents, the gradual ongoing publication of these materials, complemented by independent research from information security experts has provided a unique insight into the extent of global surveillance programs run by the US intelligence agencies and their partners from various European countries. Carefully timed, they’ve provided an exciting and at the same time deeply disturbing reading for both IT experts and the general public. In the recent period, it looked as if the trickle of news regarding our...

Blog

Windows 10 will support FIDO standards for strong authentication

At KuppingerCole, we have been following the progress of FIDO alliance for quite some time . Since their specifications for scalable and interoperable strong authentication have been published last year, FIDO has already had several successful deployments in collaboration with such industry giants as Samsung, Google and Alibaba. However, their probably biggest breakthrough been announced just a few days ago by none other than Microsoft. According to their announcement , Microsoft’s upcoming Windows 10 will include support for FIDO standards to enable strong and password-free...


KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

Subscribe to our Podcasts

KuppingerCole Podcasts - watch or listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00