Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
EIC Speaker Spotlight: Chris Owen on Identity Management
Chris Owen, Director of Product Management at Savyint is to deliver a presentation on Worlds Collide: The Importance of Convergence in IAM on Tuesday, September 14 starting at 8:30 pm at EIC...
Learn more
Buyer's Compass
Buyer's Compass
Security Operations Center as a Service (SOCaaS)
The Security Operations Center-as-a-Service (SOCaaS) market continues to develop in response to demand for security monitoring, analysis, detection, response, and improvement recommendations either...
Learn more
Event Recording
Event Recording
From A to B - How Decentralized Technologies Are Changing Collaboration Between the Public and Private Sector
The world of modern urban mobility is full of - unused - opportunities. To get to their destination, people can use public transportation, take a cab or rent an e-scooter. But many options also...
Learn more
Cyber-Attacks: Why Preparing to Fail Is the Best You Can Do
Blog
Cyber-Attacks: Why Preparing to Fail Is the Best You Can Do
Nowadays, it seems that no month goes by without a large cyber-attack on a company becoming public. Usually, these attacks not only affect revenue of the attacked company but reputation as well....
AI for Governance and Governance of AI
Blog
AI for Governance and Governance of AI
Artificial Intelligence is a hot topic and many organizations are now starting to exploit these technologies, at the same time there are many concerns around the impact this will have on society....
Can Your Antivirus Be Too Intelligent Sometimes?
Blog
Can Your Antivirus Be Too Intelligent Sometimes?
Current and future applications of artificial intelligence (or should we rather stick to a more appropriate term “Machine Learning”?) in cybersecurity have been one of the hottest...
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Blog
Privileged Access Management Can Take on AI-Powered Malware to Protect Identity-Based Computing
Much is written about the growth of AI in the enterprise and how, as part of digital transformation, it will enable companies to create value and innovate faster. At the same time, cybersecurity...
Leading IDaaS Supplier OneLogin Aiming for the Top
Blog
Leading IDaaS Supplier OneLogin Aiming for the Top
OneLogin is among the leading vendors in the overall, product, innovation and market leadership ratings in KuppingerCole’s latest Leadership Compass Report on IDaaS Access Management , but...
AI in the Auto Industry Is About More Than Self-Driving Cars
Blog
AI in the Auto Industry Is About More Than Self-Driving Cars
Car buyers gathering at the Frankfurt Motor Show last month will have witnessed the usual glitz as car makers went into overdrive launching new models, including of course many new electric...
Cognitive! - Entering a New Era of Business Models Between Converging Technologies and Data
Blog
Cognitive! - Entering a New Era of Business Models Between Converging Technologies and Data
Digitalization or more precisely the "digital transformation" has led us to the "digital enterprise". It strives to deliver on its promise to leverage previously unused data and the...
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
Blog
Redefining the Role of the CISO – Cybersecurity and Business Continuity Management Must Become One
Cyberattack resilience requires way more than just protective and defensive security tools and training. Resilience is about being able to recover rapidly and thus must include BCM (Business...
Regulating AI's Limitless Potential
Blog
Regulating AI's Limitless Potential
Regulation has the uncomfortable task of limiting untapped potential. I was surprised when I recently received the advice to think of life like a box. “The walls of this box are all the...
Blockchain: It’s not About Technology, It Is About Use Cases
Blog
Blockchain: It’s not About Technology, It Is About Use Cases
Today, the German Federal Government announced its Blockchain Strategy . What might sound as a great thing, falls short, for a number of reasons. One is that it is late: after the first hype...
PSD2 in a Europe of Small Principalities
Blog
PSD2 in a Europe of Small Principalities
Europe’s consumers have been promised for some years now that strong customer authentication (SCA) was on its way. And the rules as to when this should be applied in e-commerce are being...
What Does AI in Human Resources Mean for the Small Business?
Blog
What Does AI in Human Resources Mean for the Small Business?
Thanks to an incessant desire to remove repetitive tasks from our to-do lists, researchers and companies are developing AI solutions to HR – namely to streamline recruiting, improve the...
Previous
3 4 5 6 7 8 9 Next