Blog posts by Alexei Balaganski

Blog

Building APIs without programming? New tools from CA make it possible

Last week, CA Technologies has announced several new products in their API Management portfolio. The announcement was made during their annual CA World event, which took place November 16-20 in Las Vegas. This year, the key topic of the event has been Application Economy, so it is completely unsurprising that API management was a big part of the program. After all, APIs are one of the key technologies that drive the “digital transformation”, helping companies to stay agile and competitive , enable new business models and open up new communication channels with partners and...

Blog

Real-Time Security Intelligence Market Overview

With the ever-growing number of new security threats and continued deterioration of traditional security perimeters, demand for new security analytics tools that can detect those threats in real time is growing rapidly. Real-Time Security Intelligence solutions are going to redefine the way existing SIEM tools are working and finally provide organizations with clearly ranked actionable items and highly automated remediation workflows. Various market analysts predict that security analytics solutions will grow into a multibillion market within the next five years. Many vendors, big and...

Blog

The Glorious Return of the Albanian Virus

When I first read about the newly discovered kind of OS X and iOS malware called XcodeGhost , quite frankly, the first thing that came to my mind was: “That’s the Albanian virus!” In case you don’t remember the original reference, here’s what it looks like: I can vividly imagine a conversation among hackers, which would go like this: - Why do we have to spend so much effort on planting our malware on user devices? Wouldn’t it be great if someone would do it for us? - Ha-ha, do you mean the Albanian virus? Wait a second, I’ve got an...

Blog

Windows 10: new anti-malware features and challenges

Offering Windows 10 as a free upgrade was definitely a smart marketing decision for Microsoft. Everyone is talking about the new Windows and everyone is eager to try it. Many of my friends and colleagues have already installed it , so I didn’t hesitate long myself and upgraded my desktop and laptop at the first opportunity. Overall, the upgrade experience has been quite smooth. I’m still not sure whether I find all visual changes in Windows 10 positive, but hey, nothing beats free beer! I also realize that much more has been changed “under the hood”; including...

Blog

Amazon enters another market with their API Gateway

What a surprising coincidence: on the same day we were preparing our Leadership Compass on API Security Management for publication, Amazon has announced their own managed service for creating, publishing and securing APIs – Amazon API Gateway . Well, it’s already too late to make changes in our Leadership Compass, but the new service is still worth having a look, hence this blog post. Typically for Amazon, the solution is fully managed and based on AWS cloud infrastructure, meaning that there is no need to set up any physical or virtual machines or configure resources....

Blog

Why Cybersecurity and Politics Just Don’t Mix Well

With the number of high-profile security breaches growing rapidly, more and more large corporations , media outlets and even government organizations are falling victim to hacking attacks. These attacks are almost always widely publicized, adding insult to already substantial injury for the victims. It’s no surprise that the recent news and developments in the field of cybersecurity are now closely followed and discussed not just by IT experts, but by the general public around the world. Inevitably, just like any other sensational topic, cybersecurity has attracted politicians....

Blog

Life Management Platforms: Players, Technologies, Standards

When KuppingerCole outlined the concept of Life Management Platforms several years ago, the perspective of numerous completely new business models based on user-centric management of personal data may have seemed a bit too farfetched to some. Although the very idea of customers being in control of their digital lives has been actively promoted for years by the efforts of ProjectVRM and although even back then the public demand for privacy was already strong , the interest in the topic was still largely academic. Quite a lot has changed during these years. Explosive growth of mobile...

Blog

The New Meaning of “Hacking your TV”

After a long list of high-profile security breaches that culminated in the widely publicized Sony Pictures Entertainment hack last November, everyone has gradually become used to this type of news. If anything, they only confirm the fact that security experts have known for years: the struggle between hackers and corporate security teams is fundamentally asymmetrical. Regardless of its size and budgets, no company is safe from such attacks simply because a security team has to cover all possible attack vectors, and a hacker needs just a single overlooked one. Another important factor is...

Blog

De-Mail: Now with End-to-end Encryption?

In case you don’t know (and unless you live in Germany, you most probably don’t), De-Mail is an electronic communications service maintained by several German providers in accordance with German E-Government initiative and the De-Mail law declaring this as a secure form of communication. The purpose of the service is to complement traditional postal mail for the exchange of legal documents between citizens, businesses and government organizations. Ever since its original introduction in 2012, De-Mail has been struggling to gain acceptance of German public. According to...

Blog

Internet of Opportunities

For a topic so ubiquitous, so potentially disruptive and so overhyped in the media in the recent couple of years, the concept of the Internet of Things (IoT) is surprisingly difficult to describe. Although the term itself has appeared in the media nearly a decade ago, there is still no universally agreed definition of what IoT actually is. This, by the way, is a trait it shares with its older cousin, the Cloud. On the very basic level, however, it should be possible to define IoT as a network of physical objects (“things”) capable of interacting and exchanging information...


KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00