Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Hybrid Event
Hybrid Event
cyberevolution
Attend cyberevolution in Germany and meet 500 security experts. Participate in interactive sessions to explore cybersecurity in an AI powered digital world. Network with an international community...
Learn more
Blog
Blog
NIS2 Directive: Who, What, and How?
In the wake of increased cyber-attacks on national critical infrastructure, authorities around the world are imposing stricter requirements on organizations that their populations rely on for a...
Learn more
Market Compass
Market Compass
Policy Based Access Management
Access control is recognized as the most important component of an organization's cybersecurity protection. For too long access control has been based on static entitlements, but this is changing....
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
Matthias Reinwarth and Martin Kuppinger explain how to protect your users from phishing attacks when they're all working from home... Learn more about how to continue successful business with...
Learn more
Who is Responsible for Operational Technology Security?
Blog
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not...
Protection Against Multi-Vector DDoS and Bot Attacks
Video
Protection Against Multi-Vector DDoS and Bot Attacks
Join John Tolbert, Director of Cybersecurity Research at KuppingerCole, in this insightful episode featuring George Tarasov, Product Manager at Qrator Labs. Explore the world of multi-vector DDoS...
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
Future Cybersecurity Threats: Be Prepared
Blog
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past...
Analyst Chat #177: OWASP 2023 - Web Security Today is API Security
Analyst Chat
Analyst Chat #177: OWASP 2023 - Web Security Today is API Security
Join host Matthias and expert guest Alexei Balaganski in this episode of the KuppingerCole Analyst Chat. They discuss the recently updated Open Web Application Security Project (OWASP) API...
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Webinar Recording
3rd Party Identity Risk – Der Feind Im Eigenen Haus (?)
Hierzu ist es unerlässlich, Identitätstypen nicht als voneinander getrennt agierende Entitäten, sondern als ineinander verwobene Fasern zu begreifen – die Identity Fabric....
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Webinar Recording
Why Network Detection & Response (NDR) Is Central to Modern Cyber Architecture
Join security and business experts from KuppingerCole Analysts and cyber technology firm Exeon Analytics as they discuss how these challenges can be met using machine learning supported and log...
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation...
When SSI Meets IoT: Challenges and Opportunities
Event Recording
When SSI Meets IoT: Challenges and Opportunities
In this session, I will first talk about the design considerations and challenges when applying SSI to IoT, followed by the description of an initiative for creating an embedded SDK for SSI....
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Event Recording
Safeguarding IoT/OT/IIoT Devices, Their Identities and Communication with Autonomous Networking
Autonomous networking aims at the appropriate handling of the growing number of devices, machine, sensors and components for which authentication and authorization must be ensured, i.e.,...
1 2 3 4 5 6 7 Next