Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
We already hear a lot about artificial intelligence (AI) systems being able to automate repetitive tasks. But AI is such a large term that encompasses many types of very different technologies....
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Event Recording
Event Recording
Monica Singer: The Art of the Possible with Blockchain Technology
The explanation will enable CEOs and CFOs of any business to understand how this technology will impact their business.
Learn more
The Year of Connected Identity: Bringing it all Back Home
Event Recording
The Year of Connected Identity: Bringing it all Back Home
Cybersecurity practitioners agree that Identity is now at the heart of everything we do.  A variety of inescapable forces have brought us to this point and our success in the next years...
From Local to Global: ABB's New Platform-First IGA Program
Event Recording
From Local to Global: ABB's New Platform-First IGA Program
Identity governance and administration (IGA) is a mission-critical part of every business as it relates to security, compliance, and operations. For large, global enterprises like ABB, finding the...
3 Dimensions of Digital Sovereignty
Event Recording
3 Dimensions of Digital Sovereignty
Digital sovereignty has become an important topic for individuals as well as a strategic issue for countries and businesses, allowing them to operate in an environment that they trust and can...
Challenges, Risks and Rewards of Energy Grid Smartification
Event Recording
Challenges, Risks and Rewards of Energy Grid Smartification
Why Policy-Based Authorization is Critical for Identity First Security
Event Recording
Why Policy-Based Authorization is Critical for Identity First Security
The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly...
Ceremonies
Event Recording
Ceremonies
The act of identifying oneself to a website or service is a ceremony so common that we don’t often pay attention to it. The muscle memory we have built up over years of performing this...
Microsoft Security Copilot: Value-adding Generative AI
Blog
Microsoft Security Copilot: Value-adding Generative AI
Microsoft announced the Microsoft Security Copilot, a new security offering based on a combination of the GPT-4 language model, the well-known technology provided by OpenAI that also powers ChatGPT...
Urgent: Find and Block Identity-Centric Security Threats Today
Webinar Recording
Urgent: Find and Block Identity-Centric Security Threats Today
Join experts from KuppingerCole Analysts and AI-assisted behavioral analysis firm Sharelock as they discuss why Identity Threat Detection & Response (ITDR) is a crucial component of an...
Sharelock ITDR
Executive View
Sharelock ITDR
ITDR (Identity Threat Detection & Response) is an emerging capability that is of utmost importance for dealing with the ever-increasing number of identity-related threats. Being able to identify...
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
Analyst Chat
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
Get ready to hear a new take on generative pre-trained transformers! This week, Matthias sat down with Jörg Resch, Co-founder of KuppingerCole Analysts, to discuss the exciting possibilities...
Analyst Chat #163: Zero Trust in Artificial Intelligence
Analyst Chat
Analyst Chat #163: Zero Trust in Artificial Intelligence
In this podcast episode, Alexei Balaganski and Matthias discuss the increasing use of ChatGPT and other machine learning-based technologies in research and the potential risks associated with...
Evolving Identity and Access Management for the Digital Era
Webinar Recording
Evolving Identity and Access Management for the Digital Era
Join Identity & Access Management experts from KuppingerCole Analysts and Broadcom as they discuss how business IT is changing, and the implications for IAM. They will define modern IAM and...
Previous
5 6 7 8 9 10 11 Next