Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Hybrid Event
Hybrid Event
European Identity and Cloud Conference 2024
Join Europe's leading event for the future of digital identities and cybersecurity from June 4 - 7, 2024, in Berlin, Germany! EIC 2024 will take place in a hybrid format, bringing together IT...
Learn more
Blog
Blog
Compromise of IOTA
Turning a blind eye to security in favor of optimism If you have any take-away from reading KuppingerCole research , hopefully it is that APIs are a critical element to protect. This is true...
Learn more
Whitepaper
Whitepaper
How to Do Identity Right When Developing Digital Services
In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of...
Learn more
Event Recording
Event Recording
What Supports Zero Trust in the Enterprise?
When we think of Zero Trust, we often discuss how it can support and improve your security posture, defense-in-depth strategies, and architecture -- but what supports Zero Trust? This discussion...
Learn more
Reducing the Species in your Cybersecurity Zoo
Event Recording
Reducing the Species in your Cybersecurity Zoo
Event Recording
"The Great Resignation" Combined with an Explosion in IT Complexity - How Can IT Weather this Perfect Storm?
Knowing differences between Cyber Resistance and Cyber Resilience
Event Recording
Knowing differences between Cyber Resistance and Cyber Resilience
You've probably heard about Cyber Resilience, but what should be the differences between the two terms in the context of Cybersecurity? Cyber Resistance is the same or not?. During this...
The impact of decentralized identity solutions in the marketplace, insights and lessons
Event Recording
The impact of decentralized identity solutions in the marketplace, insights and lessons
Long theorized as the solution to the verification problem on the internet, decentralized identity has now achieved lift-off in the marketplace. In this workshop, we’ll explain who’s...
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Event Recording
Closing Keynote & Announcement of EIC 2022 Gamification Winners
Enabling MFA and SSO for IoT and Constrained Devices
Event Recording
Enabling MFA and SSO for IoT and Constrained Devices
OT Patch Management Best Practices
Event Recording
OT Patch Management Best Practices
Navigating the OT World – Selecting a Solution to Suit
Event Recording
Navigating the OT World – Selecting a Solution to Suit
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Event Recording
Inside the Mind of a Hacker – From Initial Access to Full Domain Admin
Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and...
Creating a Seamless Access Experience with the Digital Double
Event Recording
Creating a Seamless Access Experience with the Digital Double
Today, seamless access experiences are crafted based on identity fundamentals such as single sign-on, multi-factor authentication, passwordless authentication, self-service portals, and federated...
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
Event Recording
Game Theory: Will it put your mind at ease, or make you doubt your decision on where to run an IAM solution?
Digital Identity in Travel (and beyond): a public-private affair
Event Recording
Digital Identity in Travel (and beyond): a public-private affair
Previous
6 7 8 9 10 11 12 Next