Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Elements of a Disaster Operations Plan
If anyone in any organization was in any doubt about the importance of having a Disaster Operations Plan, that has surely changed since the outbreak of the Covid-19 pandemic. Some organizations...
Learn more
Executive View
Executive View
SailPoint IdentityIQ
IdentityIQ continues to provide organizations with a comprehensive solution to their identity management requirements. With the recent advances in predictive identity management, the tool reduces...
Learn more
Event Recording
Event Recording
A 4 Year Journey Towards a Smooth and Strong e-Signing Solution in a Multi-National Insurance Company
A journey of the multi-national insurance company to find and introduce a smooth corporate e-signing solution, both legally and technically well-justified. A story of considering and aligning...
Learn more
The Best Security Tool Is Your Own Common Sense
Blog
The Best Security Tool Is Your Own Common Sense
Earlier this week, Germany’s Federal Office for Information Security (popularly known as BSI) has released their Digital Barometer 2019 (in German), a public survey of private German...
Could Artificial Intelligence Put Lawyers Out of Business?
Blog
Could Artificial Intelligence Put Lawyers Out of Business?
Artificial intelligence (AI) and machine learning tools are already disrupting other professions. Journalists are concerned automation being used to produce basic news and weather reports. Retail...
Mastercard Breach Shows Third Party Security Is Priceless
Blog
Mastercard Breach Shows Third Party Security Is Priceless
Reports of a data breach against Mastercard began surfacing in Germany early last week with Sueddeutsche Zeitung (in German) one of the first news outlets to report on the loss. As is often the...
EU EBA Clarifies SCA and Implementation Exceptions
Blog
EU EBA Clarifies SCA and Implementation Exceptions
The EU European Banking Authority issued clarifications about what constitutes Strong Customer Authentication (SCA) back in late June. The definition states that two or more of the following...
How to Train Your AI to Mis-Identify Dragons
Blog
How to Train Your AI to Mis-Identify Dragons
This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to...
Assuming High Criticality: Resilience, Continuity and Security for Organizations and Infrastructures
Blog
Assuming High Criticality: Resilience, Continuity and Security for Organizations and Infrastructures
Acronyms are an ever-growing species. Technologies, standards and concepts come with their share of new acronyms to know and to consider. In recent years we had to learn and understand what GDPR...
Will the Stars Align for Libra?
Blog
Will the Stars Align for Libra?
This week, Facebook announced details about its cryptocurrency project, Libra. They expect it to go live for Facebook and other social media platform users sometime in 2020. The list of initial...
Robotic Process Automation – an IAM Challenge
Blog
Robotic Process Automation – an IAM Challenge
Don’t Run into Security Risks by Managing Robot Accounts the Wrong Way Robotic Process Automation (RPA) is one of the hot IT topics these days. By using robots that automatically perform...
CIAM as a Key Factor in the Digital Transformation
Blog
CIAM as a Key Factor in the Digital Transformation
Digital Transformation is one of those buzzwords (technically a buzzphrase, but buzzphrase isn’t a buzzword yet) that gets used a lot in all sorts of contexts. You hear it from IT vendors,...
Could Less Data Be More Data?
Blog
Could Less Data Be More Data?
Data, a massive amount of data, seems to be the holy grail in building more sophisticated AI’s, creating human-like chatbots and selling more products. But is more data actually better? With...
Artificial Intelligence in Cybersecurity: Are We There Yet?
Blog
Artificial Intelligence in Cybersecurity: Are We There Yet?
Artificial Intelligence (along with Machine Learning) seems to be the hottest buzzword in just about every segment of the IT industry nowadays, and not without reason. The very idea of teaching a...
AI Myths, Reality and Challenges
Blog
AI Myths, Reality and Challenges
The dream of being able to create systems that can simulate human thought and behaviour is not new. Now that this dream appears to be coming closer to reality there is both excitement and alarm....
Previous
4 5 6 7 8 9 10 Next