Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past cyber-attacks reveals that they tend to be cyclic and lack any real innovation. Most "sophisticated" attacks are just different combinations of well-known attack tactics, techniques, and procedures (TTPs) applied to new technologies. Therefore, the key to success lies in focusing on new technologies, protecting data within them, and automating processes to keep up with the pace of change....
The Rise of AI Is Revolutionizing Cyber-Attacks
How is AI used by attackers? Cyber attackers that use AI may exploit system and network weaknesses with unparalleled precision. Attackers can rapidly detect holes in defenses using advanced algorithms and Machine Learning (ML), allowing them to execute targeted attacks that maximize their chances of success on their probes. Besides, AI provides cyber attackers with sophisticated capabilities for bypassing traditional security barriers. Attackers can use AI to build evasion strategies that resemble genuine user behavior, making it more difficult for security systems to discern between...
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Oracle Access Governance: Cloud-Based Centralized Visibility
In the last few years, several prominent security-related incidents have originated from inefficient governance of identities such as the Equifax data breach in 2017 where data of 147 million identities was compromised or the Microsoft Exchange Server data breach in 2021 which affected 30,000 organizations from 150 countries. Data theft, loss of personally identifiable information (PII), and industrial espionage through unauthorized access are severe security risks in every industry. Organizations struggle with centralized visibility for identifying who has access to what, who has accessed...
AI and Cybersecurity: A New Hope for Cyber Defenders?
Benjamin Franklin, the famous American statesman (happy 4th of July, by the way!), once claimed: “in this world nothing can be said to be certain, except death and taxes”. Well, nowadays, there is another certainty for every organization in the world – eventually it will be hacked. If yours has not yet been attacked by cybercriminals, then it can easily happen tomorrow or even worse: it might have already happened, but you just haven’t found out yet. Statistics from around the world clearly show that data breaches, ransomware attacks, and other kinds of...
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Artificial intelligence has transformed the field of cybersecurity by enabling advanced threat detection, automated response systems, and improved overall defense strategies. Although it is considered a game changer in cybersecurity, the adoption of AI presents significant ethical challenges, bias, and the growing risk of deepfakes. Ethics in AI is a topic that has been discussed for many years, but in today's context, AI is making decisions that directly impact people and organizations, and the importance of considering ethics is a must. A critical examination of the moral and societal...
Microsoft Putting Decentralized Identities Into Practice
Decentralized Identities in all their facets have been a hot topic at the European Identity and Cloud Conference 2023 (EIC) , which ran in Berlin last week. Just a few days before, Microsoft announced their support for Verified Workplace in LinkedIn using Microsoft Entra Verified ID . Verifying the workplace What Microsoft announced is focused on a particular use case, the verification of workplaces of LinkedIn members. It builds on multi-step verification. The entry level is workplace email verification. There is little friction in that. Organizations can verify the work...
Identity as the Most Critical Element of Security
With all of us having multiple identities in today's highly digitized world, it would be difficult to disagree with Hed Kovetz, when he says that identity is "almost the last thing that defines the virtual enterprise". As CEO and Co-Founder of Silverfort, Hed knows a thing or two about managing identities properly and shared some of his thoughts in this Speaker Spotlight. Tune in to today’s episode and don't forget to join Hed's keynote on Day 2 of the European Identity and Cloud Conference 2023 where he will be looking at The Identity Security Blind Spot: MFA for Legacy Systems...
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access entitlements and authentication. The importance of IAM continues to grow as cyber threats continue to evolve and data privacy regulations become more stringent. According to a recent survey conducted by KuppingerCole Analysts, nearly 95% of organizations have an IAM solution in place. Most medium-sized to large organizations, factually, have multiples different IAM solutions in place for providing...
Microsoft Security Copilot: Value-adding Generative AI
Just recently, Microsoft announced the Microsoft Security Copilot , a new security offering based on a combination of the GPT-4 language model, the well-known technology provided by OpenAI that also powers ChatGPT and Microsoft Bing, and Microsoft’s own technology, data, knowledge, and security-specific model from their ongoing global threat intelligence. As the name indicates, the new solution, which is not publicly available yet, is positioned as a “copilot” augmenting the security analysts in SOCs (Security Operations Centers) / CDCs (Cyber Defense Centers) and...
Top 3 EIC Topics Picked by Martin Kuppinger
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud Conference. In his view, these are Cloud Infrastructure Entitlement Management (CIEM), Passwordless Authentication, and Decentralized Identity. Tune in to today’s Speaker Spotlight to hear why Martin thinks these three concepts have gained so much importance, and which other topics he believes will be highly relevant at EIC 2023.
Battling Insider Threats with Zero Trust
When the COVID-19 pandemic broke out in 2020, many organizations were forced to digitize at a speed exceeding their security capabilities. Remote work meant that employees accessed company networks from potentially unsafe end devices. Today, many in the e-commerce business work in a hybrid mode – partly from home, partly from the office – and are thus potential insider threats. According to today’s guest in our Speaker Spotlight, Rajan Barara, Director of Product Management for Identity at Entrust, Zero Trust can help mitigate the risk of insider threats. At its core,...
Previous
1 2 3 4 5 6 7 Next