Threat Detection and Incident Response
Organizations and society in general have become more and more dependent on IT delivered services. This has increased the potential impact of risks from cyber-attacks. Cybersecurity needs to meet this challenge by moving beyond the traditional approach of protection, detection, and response.
Do We Finally Have Digital Identity for Both Worlds?
Currently, our existence straddles two realms: the physical and the digital. Our daily interactions are a testament to this dual existence—using a physical smart card or facial recognition to access digital workspaces, or presenting a digital bus pass for a physical journey.
AI Regulation: Challenges and Opportunities
The US and EU share the common goal of ensuring safe and democratic AI, fostering the potential for aligned transatlantic regulatory approaches. The EU-US Trade and Technology Council demonstrates early success in collaborating on trustworthy AI metrics and methodologies, emphasizing the need for further alignment and knowledge sharing.
Elevate Your Digital ID Game with This EIC 2023 Workshop
At the 2023 European Identity and Cloud Conference, KuppingerCole held a workshop entitled “Building the Roadmap for Your Future IAM”. You can now watch this workshop for free.
Cyber Security Evolve or Die
Cyber security is never done – you need to constantly work to improve your organization’s cyber security readiness. Cyber adversaries never sleep and the geopolitical tensions across the world are raising the cyber security threat levels.
The Power of Identity Management in Revolutionizing Financial Services
The participation of financial services has always been a crucial aspect of the European Identity and Cloud Conference (EIC). In its 17-year history, EIC has seen many representatives of large banks, insurance companies, and other financial institutions share practical insights. Today we present the first set of speakers for EIC 2024 from organizations such as Visa Europe, the Mitsubishi Bank of Tokyo, and Northwestern Mutual.
Reflections on the Okta Breaches: We All Live in Glass Houses Now
When the closing bell rang at the NASDAQ on November 29, 2023, Okta shares had been devalued by nearly 7% and received six downgrades from previous estimates, despite the company’s better-than-expected earnings report. According to a TD Cowen analyst report, OKTA's financial performance is reflecting “the impact of recent high-profile breaches involving the company’s solutions.”
Why GPTs are a Relationship Store, Not an App Store
For anyone paying attention to the OpenAI DevDay announcements a few weeks ago, Gizmodo’s recent article “Be Careful What You Tell OpenAI’s GPTs” shouldn’t come as news.
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance.
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments and international organizations, it represented the beginning of long-term international cooperation on AI safety, with the next summit already planned in 2024 in France.
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals.
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
Previous
1 2 3 4 5 6 7 Next