CIAM - Customer IAM explained
Martin Kuppinger talks about CIAM and explains what Customer IAM means.
Blockchain is more than Bitcoin
Martin Kuppinger about Blockchain and that it is more than just a part of the Bitcoin cryptocurrency.
Security & Privacy by Design is Agility by Design – time to rethink Banking IT
81 million dollars, that was the sum hackers stole from the central bank of Bangladesh this year in April by breaching the international payment system SWIFT. Three other SWIFT hacks followed quickly in other banks. SWIFT reacted by announcing security improvements, including two-factor authorization , after first remarks that the reasons for the successful attacks lie with the robbed banks and their compromised systems. Whoever has made a mistake here, maybe all involved parties, the growing number of cyberattacks against banks is not really surprising, since hackers tend to go...
Vista Equity Partners to Acquire Ping Identity
Yesterday, Ping Identity announced the intent of Vista Equity Partners to acquire it. Ping Identity is a privately held company backed by venture capital, and will become acquired by a private equity firm. This acquisition is no real surprise to me. We have seen a few private equity deals in the past years, with SailPoint and NetIQ becoming acquired by Thoma Bravo (with the most of NetIQ’s business now being part of Micro Focus) or Courion becoming acquired by K1 Investment Management. Ping Identity has grown massively over the past years, so this acquisition is a logical step in...
IoT (or IoEE): Product Security Is Becoming a Strategic Risk
For a long time, IT risks have been widely ignored by business people, including Corporate Risk Officers (CROs) and C-level management. This has changed recently with the increasing perception of cyber-security risks. With the move to the IoT (Internet of Things) or, better, the IoEE (Internet of Everything and Everyone), we are beginning upon a new level. When a company starts selling and deploying connected things, this also raises product liability questions. Obviously, goods that are connected are more in danger than goods that aren’t. Connecting things creates a new type of...
Complexity Kills Agility: Why the German Reference Architecture Model for Industry 4.0 Will Fail
The German ZVEI (Zentralverband Elektrotechnik- und Elektroindustrie), the association of the electrical and electronic industries, and the VDI (Verein Deutscher Ingenieure), the association of German engineers, has published a concept called RAMI (Referenzarchitekturmodell Industrie 4.0). This reference architecture model has a length of about 25 pages, which is OK. The first target listed for RAMI 4.0 is “providing a clear and simple architecture model as reference”. However, when analyzing the model, there is little clearness and simplicity in it. The model is full of...
There Is No Such Thing as an API Economy
Martin Kuppinger explains why there is no API economy.
Free MFA on Windows for the masses
Cion Systems , a US-based IAM (Identity and Access Management) vendor, recently released a free service that allows Windows users to implement  two-factor authentication. It works only for Windows and supports either a PIN code sent via SMS (not available in all countries) or a standard USB storage key as the second factor. Thus, users can increase the security of their Windows devices in a simple and efficient manner, without the need of paying for a service or purchasing specialized hardware. Their free service is based on the same technology Cion Systems is using for their...
„Disruptive Change“: Right time to think security anew
Is „Digital Transformation“ something of the future? Definitely not. It has long become reality. With connected things and production, business models of enterprises are already changing profoundly. Communication with customers no longer happens over traditional websites. It encompasses apps and increasingly connected things as well. Rapidly changing business models and partnerships lead to new application architectures like micro service models , especially however to a more intensive usage of APIs (Application Programming Interfaces, interfaces of applications for external...
Thycotic acquires Arellia – moving beyond pure Privilege Management
On February 23 rd , 2016, Thycotic, one of the leading vendors in the area of Privilege Management (also commonly referred to as Privileged Account Management or Privileged Identity Management) announced the acquisition of Arellia. Arellia delivers Endpoint Security functionality and, in particular, Application Control capabilities. Both Thycotic and Arellia have built their products on the Microsoft Windows platform, which will allow the more rapid integration of the two offerings. Thycotic, with its Secret Server product, has evolved over the past years from an entry-level solution...
Beyond Datacenter Micro-Segmentation – start thinking about Business Process Micro-Segmentation!
Sometime last autumn I started researching the field of Micro-Segmentation, particularly as a consequence of attending a Unisys analyst event and, subsequently, VMworld Europe. Unisys talked a lot about their Stealth product, while at VMworld there was much talk about the VMware NSX product and its capabilities, including security by Micro-Segmentation. The basic idea of Datacenter Micro-Segmentation, the most common approach on Micro-Segmentation, is to segment by splitting the network into small (micro) segments for particular workloads, based on virtual networks with additional...
Secured by Design: The smart streets of San Francisco
On April 18 th 1906, an earthquake and fires destroyed nearly three quarters of San Francisco. Around 3000 people lost their lives. Right up to the present many other, less critical tremors followed. The danger of another catastrophe can’t be ignored. In a city like San Francisco, however wonderful it might be to live there, people always have to be aware that their whole world can change in an instant. Now the Internet of Things (IoT) can help to make alarm systems get better. People in this awesome city can at least be sure that the mayor and his office staff do their best to keep...
Previous
7 8 9 10 11 12 13 Next