Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Navigating the Future of API Security: Trends, Challenges, and Innovations
Today, APIs can be found everywhere — at home and in mobile devices, in corporate networks and in the cloud, even in industrial environments. The emerging era of Generative AI is also entirely...
Learn more
Blog
Blog
What Role Is Artificial Intelligence Playing During the COVID-19 Pandemic?
Novel coronavirus has impacted almost every country in the world. Millions have been infected, while fatalities caused by Covid-19 recently exceeded 100 thousand. Governments, science institutions...
Learn more
Buyer's Compass
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either...
Learn more
Event Recording
Event Recording
Panel | AI Unleashed: The Battle of Wits in Cybersecurity - Attackers vs. Defenders
Learn more
OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
Creating a Seamless Access Experience with the Digital Double
Event Recording
Creating a Seamless Access Experience with the Digital Double
Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated...
Challenges for Women in Identity and Security
Event Recording
Challenges for Women in Identity and Security
It is well known that women face various challenges when working in the IT industry. These challenges lead to the fact that only about 20% of employees in IT are women. The situation in security...
What if your digital twin misbehaves?
Event Recording
What if your digital twin misbehaves?
The concept of the digital twin comes originally from the Industry 4.0 domain with the idea of having a digital representation of real-life objects or processes. The representation of the digital...
Quo vadis, SSI? – Self-sovereign Identity on route to production
Event Recording
Quo vadis, SSI? – Self-sovereign Identity on route to production
Self-sovereign identity (SSI) has reached the in-between stage: more than a concept, not yet fully deployed. This is where the work can get the most gruesome and exhausting, but also the most...
Panel | GAIN Interoperability
Event Recording
Panel | GAIN Interoperability
Panel | The Pieces of Modern Authorization - Whats Happening in the Market
Event Recording
Panel | The Pieces of Modern Authorization - Whats Happening in the Market
Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect
Event Recording
Building Secure, Trusted and Interoperable Self-sovereign Identity with OpenID Connect
 
Panel | IGA for Successfully Managed Identities
Event Recording
Panel | IGA for Successfully Managed Identities
If it’s not Simple, Scalable and Agile, it’s not Modern IGA
Event Recording
If it’s not Simple, Scalable and Agile, it’s not Modern IGA
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
Event Recording
Cloud 3.0: Decentralizing Cloud Storage with Web 3.0 and Analyzing Security Threats
We are in the mid of one of the most significant revolutions in the cloud and identity ecosystem since the last decade. With the dynamic transformation from Web2.0 to Web3.0, both the cloud as...
Previous
8 9 10 11 12 13 14 Next