Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Security Alert Overload: MDR is the Answer
Industrialized cyber-criminal operations and increased nation-state-sponsored cyber espionage activities mean that most organizations are under continual cyber-attack, but the worldwide shortage of...
Learn more
Blog
Blog
Three Critical Elements Required to Close the Cybersecurity Skills Gap
The status on cybersecurity is fairly clear: 82% of employers report that their cybersecurity skills are not enough to handle the rising number of cyber incidents ( Center for Strategic &...
Learn more
Whitepaper
Whitepaper
How to Do Identity Right When Developing Digital Services
In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of...
Learn more
Event Recording
Event Recording
I'm None of your Business
Learn more
Opening Session
Event Recording
Opening Session
Why Policy-Based Authorization is Critical for Identity First Security
Event Recording
Why Policy-Based Authorization is Critical for Identity First Security
The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly...
Challenges, Risks and Rewards of Energy Grid Smartification
Event Recording
Challenges, Risks and Rewards of Energy Grid Smartification
Ceremonies
Event Recording
Ceremonies
The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this...
Microsoft Security Copilot: Value-adding Generative AI
Blog
Microsoft Security Copilot: Value-adding Generative AI
Microsoft announced the Microsoft Security Copilot, a new security offering based on a combination of the GPT-4 language model, the well-known technology provided by OpenAI that also powers ChatGPT...
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an...
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
Analyst Chat
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
Get ready to hear a new take on generative pre-trained transformers! This week, Matthias sat down with Jörg Resch, Co-founder of KuppingerCole Analysts, to discuss the exciting possibilities...
Analyst Chat #163: Zero Trust in Artificial Intelligence
Analyst Chat
Analyst Chat #163: Zero Trust in Artificial Intelligence
In this podcast episode, Alexei Balaganski and Matthias discuss the increasing use of ChatGPT and other machine learning-based technologies in research and the potential risks associated with...
Evolving Identity and Access Management for the Digital Era
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and...
Previous
2 3 4 5 6 7 8 Next