Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
The 5 Golden Rules of E-Payment
Anne Bailey gives you a list of golden rules to ensure security and compliance of electronic payments.
Learn more
Executive View
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Learn more
Event Recording
Event Recording
Progress and lessons on the establishment of Digital Identity in UK
Learn more
EU Digital Identity Wallet: A Catalyst for Business Transformation
Blog
EU Digital Identity Wallet: A Catalyst for Business Transformation
On February 29, 2024, the European Union (EU) Parliament voted in favor of amendments to the eIDAS regulation, marking a significant milestone on the road to a unified standard for European digital...
AI Regulation: Challenges and Opportunities
Blog
AI Regulation: Challenges and Opportunities
The US and EU share the common goal of ensuring safe and democratic AI, fostering the potential for aligned transatlantic regulatory approaches. The EU-US Trade and Technology Council demonstrates...
The Power of Identity Management in Revolutionizing Financial Services
Blog
The Power of Identity Management in Revolutionizing Financial Services
The participation of financial services has always been a crucial aspect of the European Identity and Cloud Conference (EIC). In its 17-year history, EIC has seen many representatives of large...
Reflections on the Okta Breaches: We All Live in Glass Houses Now
Blog
Reflections on the Okta Breaches: We All Live in Glass Houses Now
When the closing bell rang at the NASDAQ on November 29, 2023, Okta shares had been devalued by nearly 7% and received six downgrades from previous estimates, despite the company’s...
Why GPTs are a Relationship Store, Not an App Store
Blog
Why GPTs are a Relationship Store, Not an App Store
For anyone paying attention to the OpenAI DevDay announcements a few weeks ago, Gizmodo’s recent article “Be Careful What You Tell OpenAI’s GPTs” shouldn’t come as news.
The Bletchley Declaration: The Imitation Game of a Different Kind
Blog
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments...
The Human Vector
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
GPTs, Databases, and AI Agility
Blog
GPTs, Databases, and AI Agility
How to reconcile Generative AI proliferation with security and compliance requirements? Let's have a look at several potential approaches...
A Secure Supply Chain is Impossible. Here is why.
Blog
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But...
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
Securing the Autonomous World by Reinforcing Cybersecurity
Blog
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and...
Future Cybersecurity Threats: Be Prepared
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
1 2 3 4 5 6 7 Next