Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Security Alert Overload: MDR is the Answer
Industrialized cyber-criminal operations and increased nation-state-sponsored cyber espionage activities mean that most organizations are under continual cyber-attack, but the worldwide shortage of...
Learn more
Blog
Blog
AI and Cybersecurity: A New Hope for Cyber Defenders?
Statistics from around the world clearly show that data breaches, ransomware attacks, and other cyberthreats are on the rise. Everyone has high hopes for Artificial Intelligence (AI) technologies...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Event Recording
Event Recording
Give me 10 minutes, I'll give you the truth about verified Identities
Learn more
Navigating the OT World – Selecting a Solution to Suit
Event Recording
Navigating the OT World – Selecting a Solution to Suit
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Event Recording
Enhancing Cloud Security Standards: A Proposal for Clarifying Differences of Cloud Services with Respect to Responsibilities and Deployment
Widely used cloud security standards define general security measures/controls for securing clouds while not differentiating between the many, well-known implementations that differ with respect...
Enterprise Identity: A case study of the EU Gaia-X project
Event Recording
Enterprise Identity: A case study of the EU Gaia-X project
Gaia-X Federation Services is a European project that promotes innovation through data sharing and represents the next generation of the data infrastructure ecosystem. To see how we bring about an...
Unified Endpoint Management: Practical Considerations
Event Recording
Unified Endpoint Management: Practical Considerations
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
Event Recording
Vampires & Cybersecurity: Using Deception to Increase Cyber Resilience
This presentation will explore adding deception as a component of a security-in-depth strategy to increase cyber resilience (in case the garlic, crosses, and wooden stakes are not effective). We...
Joni Brennan and Allan Foster
Event Recording
Joni Brennan and Allan Foster
The Future of Digital ID in South Africa
Event Recording
The Future of Digital ID in South Africa
Cyber Security Architectures in a Hybrid World
Event Recording
Cyber Security Architectures in a Hybrid World
A practical approach to cyber security architectures: In a hybrid ecosystem we have not only to find a suitable security model for IT but also for OT like in production environments. And after...
Panel | CIAM and Customer Data Platforms
Event Recording
Panel | CIAM and Customer Data Platforms
Protocol Independent Data Standards for Interoperability
Event Recording
Protocol Independent Data Standards for Interoperability
Previous
6 7 8 9 10 11 12 Next