Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Identity Assurance Using Biometrics
Access controls all too often rely on things such as passwords, security questions, and physical tokens that can be shared or stolen, making such systems vulnerable to abuse. However, security can...
Learn more
Blog
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Event Recording
Event Recording
European Identity & Cloud Awards Ceremony
Once again, analysts from KuppingerCole come together to showcase outstanding Identity Management and Security projects, standards and people. The winners will be honored live on stage during the...
Learn more
EUDI Wallet - Critical Success factors for Digital Single Market and Private Sector Use
Event Recording
EUDI Wallet - Critical Success factors for Digital Single Market and Private Sector Use
Why the private sector is the major milestone for the European Identity Wallet to succeed ? Let’s discuss: • Will the current EUDI-wallet enable or hamper eg the banking...
European Identity & Cloud Awards Ceremony
Event Recording
European Identity & Cloud Awards Ceremony
OpenWallet Deepdive
Event Recording
OpenWallet Deepdive
Prompt Engineering for Identity Security Professionals | Workshop
Event Recording
Prompt Engineering for Identity Security Professionals | Workshop
ChatGPT mainly is what you make out of it. If you are an author it will help you writing. If you are a tech analyst it will help you create a list of critical capabilities for a certain species of...
Challenges, Risks and Rewards of Energy Grid Smartification
Event Recording
Challenges, Risks and Rewards of Energy Grid Smartification
Why Policy-Based Authorization is Critical for Identity First Security
Event Recording
Why Policy-Based Authorization is Critical for Identity First Security
The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly...
Identity Inclusion – Why it Matters
Event Recording
Identity Inclusion – Why it Matters
The cornerstone of the digital world is trust and key to that experience is a secure and verifiable digital identity. More than one billion people worldwide lack a basic verifiable identity....
3 Dimensions of Digital Sovereignty
Event Recording
3 Dimensions of Digital Sovereignty
Digital sovereignty has become an important topic for individuals as well as a strategic issue for countries and businesses, allowing them to operate in an environment that they trust and can...
From Local to Global: ABB's New Platform-First IGA Program
Event Recording
From Local to Global: ABB's New Platform-First IGA Program
Identity governance and administration (IGA) is a mission-critical part of every business as it relates to security, compliance, and operations. For large, global enterprises like ABB, finding the...
The Year of Connected Identity: Bringing it all Back Home
Event Recording
The Year of Connected Identity: Bringing it all Back Home
Cybersecurity practitioners agree that Identity is now at the heart of everything we do.  A variety of inescapable forces have brought us to this point and our success in the next years...
Previous
1 2 3 4 5 6 7 Next