Will Users and Organizations Have Trust in Keys Roaming via the Cloud?
As long as passwords continue to be used, users and organizations will remain vulnerable to attacks. Replacing passwords as the dominant form of authentication on the Internet now seems to be possible. Read now and learn more.
Government and Technology
Governments tend to be leaders in the areas of digital identity, digital transformation, and cybersecurity, which is reflected in KuppingerCole Analysts research and events. Although this happening at different paces in European countries, with some countries lagging others, we are seeing that chang
In the Midst of Change, Somethings Remain the Same
Industry 4.0 promises to take the interconnectedness of devices and machines to a new level. This will be a significant change and will impact the digital transformation of a manufacturing company. Read now and find out if your company is prepared.
Ever-Growing Attack Surface
Internet and IT went from being a convenience for people and organizations into a cyber liability. Classifying, protecting, and identifying digital assets have always been a key to mitigating cybersecurity risks. Mind your Attack Surface!
Digital Transformation - Multi-Cloud and Multi-Complex
Fragmented IT environments, multiple cloud services as well as on-premises and edge. How can you manage the complexity this has created? Find out now!
Staying Ahead in the Innovation Race
Composable Enterprise, Privacy-by-Design, Zero Trust... the direction your organization chooses to innovate in will have an influence on its investment decisions. Find inspiration, to stay ahead in this digital and technological innovation race. Read now!
Log4j Vulnerability: It Is Still a Threat
Privacy and Data Protection
Since the introduction of the EU’s General Data Protection Regulation (GDPR), privacy has become very closely associated with data protection, and while there is no real privacy without effective data protection, privacy and data protection are often separate areas that modern businesses need to foc
Arrival of the Digital Services Act (DSA)
Fully Homomorphic Encryption at a Glance
With today's technology, we can effectively encrypt data in rest and data in motion. What about data in use? There the Fully Homomorphic Encryption (FHE) comes into play. This guide shows you how FHE can be the actual "Holy Grail" of encryption. Read now!
Women in Identity
We all know that women are facing the challenge of diversity in the IT industry. But what exactly is a digital twin? And how can we build a Self-sovereign Identity? Woman in Identity (WID) has prepared three exciting sessions for you. Find out more in their blog post below.
Curse and Blessing of Biometric Authentication
Technology in itself is neither moral nor immoral, is it? It depends on how it is used. We need to have a discussion about how we move forward. Watch the interview with Mike to learn more about his views on this topic.
Previous
9 10 11 12 13 14 15 Next