Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Blog
Blog
Zero Trust: We’re Nowhere Near the End of the Story Yet
Oh, how time flies! It seems that the whole story of Zero Trust as a revolutionary concept for designing computer networks began just yesterday, but it’s been over a decade already. In fact,...
Learn more
Whitepaper
Whitepaper
Security Operations in the Age of Zero Trust
How must security operations transform to effectively deliver the comprehensive and integrated value of zero trust implementations? Security operations for Zero Trust must take a comprehensive...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #41: NIST’s Zero Trust Architecture
John Tolbert and Matthias Reinwarth look at SP 800-207, the NIST special publication on Zero Trust architecture and discuss how it aligns with KuppingerCole's own vision of this topic (spoiler: it...
Learn more
Quantum Computers: The Ultimate Opponent for Data Protection
Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there's good news: asset management has evolved. Today’s...
Workshop | Implementation of a Risk Class Model Within Access Management
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and...
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Event Recording
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Even though MDM has had a long history during war and times of high tension,  the digital era has been increasing reach and potential impact of weaponized misinformation. Sophisticated tools...
Successfully tackling your Digital Supply Chain Risk
Event Recording
Successfully tackling your Digital Supply Chain Risk
In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding...
Building Resilience After a Major Incident
Event Recording
Building Resilience After a Major Incident
This presentation will explore resilience measures to be taken immediately after a major incident.
Resilience and the Need for Privacy
Event Recording
Resilience and the Need for Privacy
This presentation will explore the role of privacy in building enterprise resilience.
Risk-Based Cyber Reporting Best Practices
Event Recording
Risk-Based Cyber Reporting Best Practices
Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the...
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Model to Quantify Cyber Security Risks
Event Recording
Model to Quantify Cyber Security Risks
Get a model and recommendations to quantify cyber security risks including the costs of fines, contractual compensations, service credits, and loss of income. The use of heatmaps with...
Previous
4 5 6 7 8 9 10 Next