Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Security Alert Overload: MDR is the Answer
Industrialized cyber-criminal operations and increased nation-state-sponsored cyber espionage activities mean that most organizations are under continual cyber-attack, but the worldwide shortage of...
Learn more
Blog
Blog
Digital Transformation
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Video
Video
AI Governance: What to Consider
Learn more
Latest Developments in CIAM
Event Recording
Latest Developments in CIAM
Consumer identity is still a hot topic in IAM in general. CIAM has experienced a great deal of technological innovation in the last five years, and much of the innovation in CIAM has found its way...
The Unique Challenges of Identity M&A in High-Growth Organizations
Event Recording
The Unique Challenges of Identity M&A in High-Growth Organizations
Mergers and acquisitions amongst large, globally-distributed organizations are notoriously complex, error-prone, and resource consuming. But did you know that merging smaller organizations comes...
Bridging Traditional IGA with Cloud Native Authorization
Event Recording
Bridging Traditional IGA with Cloud Native Authorization
IGA vendors often point to ABAC vendors when asked how authorization should actually be enforced and ABAC vendors point in the direction of IGA vendors when asked where all that context...
Drivers for Identity & Access Management in the Financial Industries
Event Recording
Drivers for Identity & Access Management in the Financial Industries
Identity & Access Management is a key requirement from banning regulations. At Creditplus, a new IAM solution was implemented recently. Drivers for IAM as well as the overall design of the...
IGA in the Financial Industry - Implementing IAM
Event Recording
IGA in the Financial Industry - Implementing IAM
Field report from a compliance-driven implementing of a full-blown IGA system at a German finance corporation.
Designing an European Identity Wallet: An overview of UI and UX aspects
Event Recording
Designing an European Identity Wallet: An overview of UI and UX aspects
The European Identity Wallet will be made available to all Europeans by the different Member states as part of the revised eIDAS regulation. In this talk Adrian Doerk will provide an overview...
The Balance Between Decentralization and Efficiency
Event Recording
The Balance Between Decentralization and Efficiency
Currently, lots of topics are fast-moving in crypto. There is still a gap to be closed between non-crypto businesses and the application of blockchain technology. It is PolyCrypt's vision to...
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
Event Recording
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as...
Progress and lessons on the establishment of Digital Identity in UK
Event Recording
Progress and lessons on the establishment of Digital Identity in UK
Securely Identifying Mobile Apps
Event Recording
Securely Identifying Mobile Apps
Today's open standards ensure that when a user chooses to login, the user’s authentication is protected and only delivered to the mobile app that initiated the authentication. However, how...
Previous
7 8 9 10 11 12 13 Next