Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

KC Open Select
KC Open Select
Data Governance
Data Governance covers platforms that assist organizations in managing data so that it meets stringent compliance regulations in different markets and catalogues data for greater business value.
Learn more
Blog
Blog
The Latest Twitter “Hack” Raises Inconvenient Questions
It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and...
Learn more
Leadership Compass
Leadership Compass
Database and Big Data Security
This Leadership Compass provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection and...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
In this episode, host Matthias Reinwarth is joined by guest Alexei Balaganski to discuss the implications of quantum computing for cybersecurity. The conversation covers the fundamentals of...
Learn more
Analyst Chat #205: From Indelible Ink to Quantum-Safe Computing - Digital Signatures
Analyst Chat
Analyst Chat #205: From Indelible Ink to Quantum-Safe Computing - Digital Signatures
In this episode, Mike Small discusses the history and role of digital signatures. He explains that digital signatures are the modern-day equivalent of indelible ink and are fundamental to the...
Beyond Secrets Management: Transforming Security in the Digital Age
Webinar Recording
Beyond Secrets Management: Transforming Security in the Digital Age
Join security and identity experts from KuppingerCole Analysts and Entrust to reveal the intrinsic and symbiotic relationship between key management and secrets, offering visibility,...
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat...
Practical Cloud Protection: A Guide for Modern Businesses
Event Recording
Practical Cloud Protection: A Guide for Modern Businesses
The realm of cloud security has been extensively covered in books and articles, yet a crucial aspect remains ripe for exploration. It revolves around the fundamental understanding of what your...
Adopting Insider Threat Management Best Practices for NIS2 Compliance
Event Recording
Adopting Insider Threat Management Best Practices for NIS2 Compliance
In today's dynamic cybersecurity landscape, safeguarding sensitive data and infrastructure from insider threats, while effectively monitoring supply chain and third-party users, is paramount. This...
Panel | Improving the Security Posture with Cloud Solutions
Event Recording
Panel | Improving the Security Posture with Cloud Solutions
Building Your Cybersecurity Strategy with Emerging Security and Privacy Technologies
Event Recording
Building Your Cybersecurity Strategy with Emerging Security and Privacy Technologies
In this session, I will give an overview of a number of emerging security and privacy technologies, such as advanced cryptography (e.g., lightweight cryptography, post-quantum cryptography, etc.),...
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Event Recording
Autonomous Ethical Hacking for Accurate and Continuous Security Testing
Organizations nowadays are agile and tech-dependent, deploying updates frequently and relying ons 3rd parties. This leads to dynamic and complex digital systems with exposed and vulnerable assets....
From Encryption to Extortion: The New Face of Ransomware Attacks
Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest...
Revealing Hidden Dimensions of Security Beyond Data Secrecy
Event Recording
Revealing Hidden Dimensions of Security Beyond Data Secrecy
The presentation will provide a framing to help attendees navigate the rapid transition from yesterday’s industrial age security paradigms to future approaches for sustaining...
GPTs, Databases, and AI Agility
Blog
GPTs, Databases, and AI Agility
How to reconcile Generative AI proliferation with security and compliance requirements? Let's have a look at several potential approaches...
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
Analyst Chat
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
In this episode, host Matthias Reinwarth is joined by guest Alexei Balaganski to discuss the implications of quantum computing for cybersecurity. The conversation covers the fundamentals of...
1 2 3 4 5 6 7 Next