Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Identity Assurance Using Biometrics
Access controls all too often rely on things such as passwords, security questions, and physical tokens that can be shared or stolen, making such systems vulnerable to abuse. However, security can...
Learn more
Blog
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
Learn more
Executive View
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Learn more
Event Recording
Event Recording
Panel | Digital Identity & Web3- Rethinking Business Models
Learn more
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Event Recording
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect...
Privacy = Data Protection + X
Event Recording
Privacy = Data Protection + X
Data Protection is a very basic and profound concept of translating privacy as a human right into the digital sphere. But is it enough? and are our current approaches the right ones? In this panel...
Trust is a Team Sport, and Like all Good Sports it has Rules
Event Recording
Trust is a Team Sport, and Like all Good Sports it has Rules
Trust is not just technical, and it’s not just derived from a process or an organisation. The need for Trust is also variable based on the risk involved in a transaction or the risk appetite...
Cyber-Securing the Digital Industry
Event Recording
Cyber-Securing the Digital Industry
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
Event Recording
Digital Identities and IoT – How to leverage OIDC and OAuth 2.0 for the best user experience and security!
Insights from India’s Data Empowerment & Protection Architecture
Event Recording
Insights from India’s Data Empowerment & Protection Architecture
In Transition - From Platforms to Protocols
Event Recording
In Transition - From Platforms to Protocols
Only a few years ago the identity ecosystem seemed to be ‘set’ with little chance for change or dislocation of the large federated identity providers. Today the entire identity...
Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Enabling Digital Identity Ecosystems
Event Recording
Enabling Digital Identity Ecosystems
Previous
4 5 6 7 8 9 10 Next