Blog posts by Paul Fisher

Blog

Stop attackers enjoying a pick ‘n’ mix attack surface

We know that the way forward for business IT is to use multi-hybrid architectures for long term agility of operations. Such architectures will include multiple clouds for new services, on-prem stacks, edge devices, OT integration and much more. But while the need for multi-hybrid is clear, the resulting complexity of ad hoc deployment of multi-hybrid architectures can lead to serious security holes. Unmanaged complexity will invariably result in an enlarged attack surface that will encourage attackers to take a pick and mix approach to find and exploit vulnerabilities within your...

Blog

Complex Modern Business Needs Trusted IT Partners to Be Secure

In today’s business environment, companies have three major challenges – making a profit, finding great people, and staying ahead of the competition. That’s quite enough, but they also have major operational challenges with IT, cyber security, and compliance. For example, IBM Security Services reports that it’s not unusual for clients to have more than 15 different cloud providers – and probably more they don’t know about. How do business and IT leaders deal with that when they don’t even know how many clouds there are, or what data resides on...

Blog

Microsoft’s Threat Intelligence Play is Good News for Customers in Fight Against Ransomware

This week, Microsoft made official its agreement to acquire Threat Intelligence vendor RiskIQ in a deal rumoured to be worth around $500m. It is not an unusual event; Microsoft has absorbed five businesses already in 2021, and usually it is to acquire a discrete technology it deems useful or sometimes to push into emerging markets. This latest acquisition falls into both camps. While Threat Intelligence is not an emerging in the normal sense, it has acquired a new importance in the last 18 months as global cyber-attacks reached a new level of intensity. The fact this has run in parallel...

Blog

PAM Is Changing and You Need to Know Why

What is left to say about PAM that has not already been said? Well in my opinion, quite a lot – as I hope you find out when you join me at the forthcoming KCLive Event, Operationalizing Privileged Access Management. I talk to PAM vendors all the time and I believe it is a truly exciting space to be covering and some of the innovations that vendors of all sizes are bringing to the table promise real progress in how we manage privilege access in the workplace – and, as you will discover, beyond the workplace.  Punching above its weight PAM is not by a long chalk...

Blog

Time CISOs Stopped Trying to Speak to the Board?

I have been covering cybersecurity issues, first as a journalist then as an analyst, since 2006. In that 15 years I have heard the mantra that security is a boardroom issue hundreds of times. The subject has filled countless conference talks and media articles. It appears that the message is still not getting through if a speech by the new CEO of the UK National Cyber Security Centre (NCSC) anything is to go by. In her first public speaking engagement in March this year, Lindy Cameron, said, you guessed it folks, security must be given more attention in the boardroom....

Blog

AI and Healthcare

AI's role in reducing the impact of future pandemics As the coronavirus spreads fear and panic across the world, it’s perhaps timely to take a step back and consider the future of healthcare and how AI will help. But first let’s consider that the coverage and spread of the virus shows us precisely just why reliable data is needed to help us cope with new diseases. At time of writing, most official advice on coronavirus is not based on hard data led evidence on how the virus spreads, the best way to contain it, who is most vulnerable, what is the incubation period and so on....

Blog

Moving Towards AI and IoT Solutions Beyond Machine Learning

Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply chain management is being transformed with digital maps of goods and services that reduce waste and logistical delays. In Finland, a combination of AI and IoT is making life safer for pedestrians. The City of Tampere and Tieto built a pilot system that automatically detects when a pedestrian is planning to cross the street at an intersection. Cameras at intersections accessed algorithms...

Blog

PAM Can Reduce Risk of Compliance Failure but Is Part of a Bigger Picture

The importance of privilege accounts to digital organizations and their appeal to cyber attackers has made Privilege Access Management (PAM) an essential component of an identity and access management portfolio. Quite often, customers will see this as purely as a security investment, protecting the company’s crown jewels against theft by organized crime and against fraudulent use by internals. More successful cyber-attacks are now enabled by attackers gaining access to privilege accounts. However, that is only part of the story. Organizations also must worry about meeting...

Blog

VMware’s New Idea for Fixing Cybersecurity: Intrinsic Security

At VMworld Europe 2019, Pat Gelsinger, CEO of VMware said security is fundamentally broken and that the overabundance of vendors is making the problem worse. I’m not sure this is true. Gelsinger had some good lines: applications that are updated and patched on a regular basis should be illegal and outlawed by legislation, and that security is too threat-based. Making security less threat-focused is a good thing The solution, according to VMware, is simple: we need to build more security in the platform with the supreme goal of a single security agent running across the entire...

Blog

OVHCloud Bets on Shift Back to Private Cloud

There is more to the cloud than AWS, Azure, IBM and Google according to OVHCloud - the new name for OVH as it celebrates its 20 th anniversary. While the big four have carved up the public cloud between them, the French cloud specialist believes that business needs are changing, which gives them an opportunity in the enterprise market it is now targeting. In short, OVHCloud believes there is a small, but discernible shift back to the private cloud - for security and compliance imperatives. That does not mean that OVHCloud is abandoning the public cloud to the Americans. At...

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00