Speaking in Cybersecurity: My Recollection!
During my studies and the subsequent first years of my career, I was already always someone who liked to share knowledge with others and present interesting topics. This is not the only reason why my profession has developed in the direction of IT consulting. In fact, in consulting, "being on stage" is part of the daily work. You present results in front of smaller and larger groups, you become more and more of an expert on a topic, and then at some point, you slide onto the bigger stage at small and large conferences. 3,5 years ago, I joined KuppingerCole and there, giving speeches on big...
The Evolution of Endpoint Security: Beyond Anti-Malware
15 to 20 years ago, a virus scanner – or let me call it Endpoint Protection – on your private or corporate computer was standard. Today, you must also have something like a virus scanner on your endpoint device. But in 2020, is it sufficient to detect viruses, worms, and rootkits or botnets like we did in the past? There have been a lot of changes in the way attackers try to steal data, get access to your computers, or even block you from working with your computer. This evolution must be part of your strategy for protecting your endpoints. It is called Endpoint...
Security Fabric: Investing in the Right Architecture for a Secure Future
Modern and hybrid operating models, Software-as-a-Service, regulatory requirements, working from home, various types of internal and external users, and the phenomenon of BYOD (bring your own device) are challenges we have to face today. Such challenges are constantly emerging, which demands a flexible approach. Often these flexible requirements result in many specific sub-solutions for particular problems. This causes the company to have no central overview of which services, which devices, and which applications are used and for what purpose. To challenge the internal IT teams even...
KuppingerCole Analyst Chat: Cybersecurity Portfolio Optimization
Matthias Reinwarth and Christopher Schütze talk about how to efficiently identify and rate your investments into Cybersecurity. Free Analyst Advice: Business Resilience Management (Crisis Roadmap for Beginners)
3 Steps to Improve Your Cybersecurity with Enterprise Risk Management
If you start considering the topic of cybersecurity in your company, you’ll quickly realize that there are many facets. In traditional companies, IT has grown in parallel to meet the requirements in digitization and production in a timely manner. These traditional companies and their suppliers with physical products such as automobiles often have a somewhat higher degree of maturity in general Enterprise Risk Management, which only deals in part with IT-relevant risks. Companies that were founded more recently, or that offer their products or services on a purely digital level...
KuppingerCole Analyst Chat: Incident Response Management
Christopher Schütze and Matthias Reinwarth explain the importance of having an incident response plan.
KuppingerCole Analyst Chat: Beyond Prevention - the Bigger Picture of Cyber Security
Matthias Reinwarth and Christopher Schütze are taking a look at five different phases of cyber security.
Preparation Is Key: Where Prevention Ends, and Business Continuity and Incident Response Management Begins
Ensuring the availability of processes and services in the event of an incident or a cyber attack is a fundamental part of a company’s cybersecurity approach. Commonly used phrases when it comes to such cybersecurity strategies, are Incident Response Management (IRM) and Business Continuity Management (BCM). Both should be part of a company's cybersecurity strategy, but what is the difference, how are they connected, and at what point in time do they start? Identification and prevention are fundamental Every organization is under attack, and there is the risk of being hit...
Top 5 Recommendations for Reducing Cyber Risks in 2020
The turn of the year has been an occasion for many cybersecurity news outlets to talk about trends and challenges in cybersecurity. Despite the importance of knowing what the trends and challenges are, we want to give you some hands-on recommendations to increase security for your company. Of course the following recommendations are just a selection out of many possible measures. We are happy to discuss with you in more detail the implications for your concrete business model. 1. Beyond detect, prevent, respond: recovery & Incident Response Management While AI helps in increasing...
Quantum Computing and Data Security - Pandora's Box or a Good Opportunity?
Not many people had heard of Schroedinger's cat before the CBS series "The Big Bang Theory" came out. Dr. Sheldon Cooper used this thought experiment to explain to Penny the state of her relationship with Lennard. It could be good and bad at the same time, but you can't be sure until you've started (to open) the relationship. Admittedly, this is a somewhat simplified version of Schroedinger's thoughts by the authors of the series, but his original idea behind it is still relevant 100 years later. Schroedinger considered the following: "If you put a cat and a poison, which is randomly...
Benchmarking Cybersecurity Environments
Addressing cybersecurity within a company often occurs in response to an incident which impacts a business’ operations. A cyber incident could be a data breach or malicious disclosure of internal information to the public. Ideally a company starts thinking about cybersecurity before they are forced to act by an incident. Preparations for a cyber incident can be made through an internal or external benchmarking of the cybersecurity landscape. What to expect from a benchmarking exercise To ensure a benchmarking preparation offers real value to the company, the expectations and...
Cyber-Attacks: Why Preparing to Fail Is the Best You Can Do
Nowadays, it seems that no month goes by without a large cyber-attack on a company becoming public. Usually, these attacks not only affect revenue of the attacked company but reputation as well. Nevertheless, this is still a completely underestimated topic in some companies. In the United Kingdom 43% of businesses experienced a cybersecurity breach in the past twelve months, according to the 2018 UK Cyber Security Breaches Survey . On the other hand, 74% say that cybersecurity is a high priority for them. So where is the gap, and why does it exist? The gap exists between the decision to...