Senior Analyst

Warwick Ashford

Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist and editor since 2003, specialising in cybersecurity and privacy since 2012. Warwick has also worked as a freelance radio producer and broadcast journalist, writing and presenting news bulletins on national radio for the South African Broadcasting Corporation.

Latest publications

Event Recording
Panel | It all starts with the Endpoint
November 15, 2023
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as “beyond PC” and “beyond mobile” types of endpoints, including printers. How…
Analyst Chat
Analyst Chat #195: Preventing Unwanted Remote Control - Safeguarding RDP Amidst Cyber Threats
November 13, 2023
Matthias is joined by cybersecurity expert Warwick Ashford to unravel the complexities surrounding Remote Desktop Protocol (RDP) security in the face of rising ransomware attacks. The discussion initiates with an overview of RDP's functionality and its indispensable role in modern…
Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
September 29, 2023
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of…
Analyst Chat
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
September 18, 2023
In this episode, host Matthias and guest Warwick Ashford dive into the EU's Digital Operational Resilience Act (DORA). They discuss its impact on the financial sector's cybersecurity and operational resilience, focusing on key objectives and challenges. The conversation also covers…
Advisory Note
EU Digital Operational Resilience Act (DORA)
September 04, 2023
Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption, including cyberattacks. The European Union has put together a framework of requirements in the…
Blog
Future Cybersecurity Threats: Be Prepared
July 18, 2023
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past cyber-attacks reveals that they tend to be cyclic and lack any real innovation. Most…
Analyst Chat
Analyst Chat #181: What Comes Next in Cybersecurity?
July 17, 2023
In this episode, Matthias engages in a conversation with Senior Analyst Warwick Ashford about the future cybersecurity landscape and threats. They discuss the notion that there's "nothing new under the sun" in cybersecurity, exploring how attackers use familiar tools and techniques in new…
Leadership Compass
Managed Detection and Response (MDR)
July 07, 2023
This KuppingerCole Leadership Compass provides an overview of the market for Managed Detection & Response services that manage a collection of cybersecurity technologies for a client organization to provide advanced cyber threat detection and response capabilities, including Security…
Analyst Chat
Analyst Chat #167: The Top 5 Ways to Protect Data
April 03, 2023
Protecting data is a responsibility for any company, regardless of whether it is considered their most valuable asset or not. Data loss can occur due to human error or malicious intent, emphasizing the need for comprehensive protection measures. In this episode of the Analyst Chat, Warwick…
Blog
Managing Privileged Access in Complex IT Environments for Business Benefit
April 03, 2023
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials. Access management, therefore, is an essential part of any cybersecurity strategy, but in the…
Leadership Compass
Data Leakage Prevention
March 30, 2023
This KuppingerCole Leadership Compass provides an overview of the market for Data Leakage Prevention (DLP) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor functionality, essential capabilities, and innovative…
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
March 01, 2023
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service (SOCaaS) market in the UAE that continues to develop in response to demand for security monitoring,…
Blog
CIAM: Balancing security and user experience to get value from customer data
February 13, 2023
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely important. But keeping sensitive data like personally identifiable information private, safe,…
Blog
Gear Up for the Future with Decentralized Identity
January 25, 2023
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to reduce the administrative load during onboarding or ongoing verification of credentials. One…
Blog
IGA, the key to security and compliance
November 29, 2022
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become increasingly reliant on complex IT environments. Key to achieving both data security and…
Blog
Reducing Risk Through Effective Access Management
November 22, 2022
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it is more important than ever to ensure that the right people have access to the right systems…
Blog
The Evolving Role of the CISO
November 15, 2022
The role of the Chief Information Security Officer (CISO) has long been a topic for debate. Almost ever since the role first emerged as organizations saw the need to focus on information security, there has been discussion about the how role could or should evolve. With information…
Blog
Cyber Resilience
November 08, 2022
In the post-pandemic world, most people understand the concept of resiliency, which refers to the capacity to recover quickly from some form of adversity - be that Covid-19 infection, cyber-attack, natural disaster, geo-political tensions, and even cyber and kinetic conflict. Business…
Blog
Passwordless Authentication
October 25, 2022
Passwords have not been fit for purpose for a long time. They are too easy to guess, crack, discover, and steal. Passwords are also costly and time consuming to manage, and password reuse is a major problem. However, after talking about getting rid of passwords for years, it is beginning to…
Blog
Cyber Supply Chain Security
October 18, 2022
Every business has a supply chain upon which it relies. Any disruption to that a supply chain has a knock-on effect on all the businesses that depend on it. Most organizations are well versed in securing physical supply chains, but the world has changed, and now there is a cyber component…
Blog
Digital Transformation
October 11, 2022
The digital age has dawned, and organizations are adopting digital processes and services as quickly as they can to remain competitive in an unpredictable commercial environment affected by rapid social change and technological innovation. Without a doubt, it is essential for modern…
Blog
CIAM a Way of Managing and Getting Value from Consumer Data
October 04, 2022
As interactions between organizations and consumers of goods and services increasingly happen online, the collection, protection, and management of consumer information has become increasingly important and challenging. In response, we have seen the emergence of Consumer Identity and…
Blog
State-sponsored Cyber Attacks
September 27, 2022
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase in this type of attack associated with the conflict in Ukraine. The primary goal of these…
Blog
Ransomware Attacks on Critical Infrastructure
September 13, 2022
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also evolving the business model and may even be collaborating with competitors , say security…