Insights

Business Resilience

Business Resilience is the ability to adapt quickly to risks and disruptions, while maintaining key business workflows and safeguarding employees, assets, and brand reputation. Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.

Guide
Guide
Business Resilience: A Strategic Approach to Business Continuity
Business Resilience Management is key to business survival in the face of rapidly changing IT, cyber threat, and regulatory environments.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Master Class
Master Class
Business Resilience Management in a Pandemic Crisis 
Attend this KC Master Class to learn what actions you can take immediately to handle the current pandemic crisis. In a second stage, an in-depth course will help you bolster your business...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
The New Normal Post Covid-19
As soon as national lockdowns began to limit the spread of Covid-19 it was clear that the world would never be the same again, and last week’s Microsoft Build conference has highlighted what...
Learn more
Executive View
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #50: The European Cybersecurity Month - Ensuring Security Beyond Awareness
This analyst chat episode is the 50th and therefore a bit different. This time Matthias talks to two experienced analysts, Martin Kuppinger and Alexei Balaganski, about the ECSM, the European...
Learn more
Three Critical Elements Required to Close the Cybersecurity Skills Gap
Blog
Three Critical Elements Required to Close the Cybersecurity Skills Gap
The status on cybersecurity is fairly clear: 82% of employers report that their cybersecurity skills are not enough to handle the rising number of cyber incidents ( Center for Strategic &...
Cyber-Attacks: Why Preparing to Fail Is the Best You Can Do
Blog
Cyber-Attacks: Why Preparing to Fail Is the Best You Can Do
Nowadays, it seems that no month goes by without a large cyber-attack on a company becoming public. Usually, these attacks not only affect revenue of the attacked company but reputation as well....
When Cyber
Blog
When Cyber "Defense" is no Longer Enough
The days in which having just an Identity and Access Management (IAM) system on-premises are long gone. With organizations moving to hybrid on-premises, cloud, and even multi-cloud environments,...
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
Blog
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
Cyberattack resilience requires way more than just protective and defensive security tools and training. Resilience is about being able to recover rapidly and thus must include BCM (Business...
The Best Security Tool Is Your Own Common Sense
Blog
The Best Security Tool Is Your Own Common Sense
Earlier this week, Germany’s Federal Office for Information Security (popularly known as BSI) has released their Digital Barometer 2019 (in German), a public survey of private German...
Mastercard Breach Shows Third Party Security Is Priceless
Blog
Mastercard Breach Shows Third Party Security Is Priceless
Reports of a data breach against Mastercard began surfacing in Germany early last week with Sueddeutsche Zeitung (in German) one of the first news outlets to report on the loss. As is often the...
The No. 1 Rule of Secure Cloud Migration: Know Your Unstructured and Dark Data and Where It Is Located
Webinar Recording
The No. 1 Rule of Secure Cloud Migration: Know Your Unstructured and Dark Data and Where It Is Located
With a huge amount of data around, cloud migration is the ideal solution today. A necessary stage in migrating data to the cloud is putting it in order. This is particularly important when it...
Are You Prepared for a Cyber-Incident?
Blog
Are You Prepared for a Cyber-Incident?
According to the Ponemon Institute - cyber incidents that take over 30 days to contain cost $1m more than those contained within 30 days. However, less than 25% of organizations surveyed...
Zero Trust Reality Check: Secure Access for Hybrid IT
Webinar Recording
Zero Trust Reality Check: Secure Access for Hybrid IT
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the...
OpenC2 – Standards for Faster Response to Security Incidents
Blog
OpenC2 – Standards for Faster Response to Security Incidents
Recently, I came across a rather new and interesting standardization initiative, driven by the NSA (U.S. National Security Agency) and several industry organizations, both Cyber Defense software...
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
Webinar Recording
Prevent Data Breaches - Moving to a Modern Approach to Breach Avoidance in Three Steps
The biggest mistake you can make it assuming you cannot, or will never, be breached – the challenge for any company is to have a strategy that meets their risk appetite, security measures...
IBM Acquires Resilient Systems
Blog
IBM Acquires Resilient Systems
Yesterday at the RSA Conference, IBM has officially confirmed what’s already been a rumor for some time – the company is planning to acquire Resilient Systems for an undisclosed...