Blog posts by Alexei Balaganski

Blog

AWS IoT Suite

After an “extended holiday season” (which for me included spending a vacation in Siberia and then desperately trying to get back into shape) it’s finally time to resume blogging. And the topic for today is the cloud platform for IoT services from AWS, which went out of beta in December. Ok, I know it’s been a month already, but better late than never, right? As already mentioned earlier , the very definition of the Internet of Things is way too blanket and people tend to combine many different types of devices under this term. So, if your idea of the Internet...

Blog

Information Rights Management explained

With the amount of digital assets a modern company has to deal with growing exponentially, the need to access them any time from any place, across various devices and platforms has become a critical factor for business success. This does not include just the employees – to stay competitive, modern businesses must be increasingly connected to their business partners, suppliers, current and future customers and even smart devices (or things). New digital businesses therefore have to be agile and connected . Unsurprisingly, the demand for solutions that provide strongly protected...

Blog

“A Stab in the Back” of IoT Security

Following the topic of the Internet of Things security covered in our latest Analysts’ View newsletter , I’d like to present a perfect example of how IoT device manufacturers are blatantly ignoring the most basic security best practices in their products. As an Austrian information security company SEC Consult revealed in their report, millions of embedded devices around the world, including routers and modems, IP phones and cameras and other network products, are reusing a small number of hardcoded SSH keys and SSL certificates . According to SEC Consult, they have...

Blog

Approaching the Internet of Things Security

As already discussed in one of our earlier newsletters , Internet of Things as a concept is by no means new – various smart devices capable of communicating with each other and their operators have been used in manufacturing, automotive industry, healthcare and even at home. These “Things” range from popular consumer products for home automation to enterprise devices like RFID tags all the way through to industrial sensors controlling critical processes like manufacturing or power generation. There is actually very little in common between them other than the reliance on...

Blog

Building APIs without programming? New tools from CA make it possible

Last week, CA Technologies has announced several new products in their API Management portfolio. The announcement was made during their annual CA World event, which took place November 16-20 in Las Vegas. This year, the key topic of the event has been Application Economy, so it is completely unsurprising that API management was a big part of the program. After all, APIs are one of the key technologies that drive the “digital transformation”, helping companies to stay agile and competitive , enable new business models and open up new communication channels with partners and...

Blog

Real-Time Security Intelligence Market Overview

With the ever-growing number of new security threats and continued deterioration of traditional security perimeters, demand for new security analytics tools that can detect those threats in real time is growing rapidly. Real-Time Security Intelligence solutions are going to redefine the way existing SIEM tools are working and finally provide organizations with clearly ranked actionable items and highly automated remediation workflows. Various market analysts predict that security analytics solutions will grow into a multibillion market within the next five years. Many vendors, big and...

Blog

The Glorious Return of the Albanian Virus

When I first read about the newly discovered kind of OS X and iOS malware called XcodeGhost , quite frankly, the first thing that came to my mind was: “That’s the Albanian virus!” In case you don’t remember the original reference, here’s what it looks like: I can vividly imagine a conversation among hackers, which would go like this: - Why do we have to spend so much effort on planting our malware on user devices? Wouldn’t it be great if someone would do it for us? - Ha-ha, do you mean the Albanian virus? Wait a second, I’ve got an...

Blog

Windows 10: new anti-malware features and challenges

Offering Windows 10 as a free upgrade was definitely a smart marketing decision for Microsoft. Everyone is talking about the new Windows and everyone is eager to try it. Many of my friends and colleagues have already installed it , so I didn’t hesitate long myself and upgraded my desktop and laptop at the first opportunity. Overall, the upgrade experience has been quite smooth. I’m still not sure whether I find all visual changes in Windows 10 positive, but hey, nothing beats free beer! I also realize that much more has been changed “under the hood”; including...

Blog

Amazon enters another market with their API Gateway

What a surprising coincidence: on the same day we were preparing our Leadership Compass on API Security Management for publication, Amazon has announced their own managed service for creating, publishing and securing APIs – Amazon API Gateway . Well, it’s already too late to make changes in our Leadership Compass, but the new service is still worth having a look, hence this blog post. Typically for Amazon, the solution is fully managed and based on AWS cloud infrastructure, meaning that there is no need to set up any physical or virtual machines or configure resources....

Blog

Why Cybersecurity and Politics Just Don’t Mix Well

With the number of high-profile security breaches growing rapidly, more and more large corporations , media outlets and even government organizations are falling victim to hacking attacks. These attacks are almost always widely publicized, adding insult to already substantial injury for the victims. It’s no surprise that the recent news and developments in the field of cybersecurity are now closely followed and discussed not just by IT experts, but by the general public around the world. Inevitably, just like any other sensational topic, cybersecurity has attracted politicians....


KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00