Media Coverage

Understanding IT Risk Management In 4 Steps X 3

A risk management matrix combines the probability of harm and the severity of harm. In IT terms that means authentication, context, and process. If you had to protect a million dollars in gold, would you spend $3 million to do it? In certain circumstances, you might. If you wanted to steal a million dollars in gold, would you spend $3 million to do it? Many would answer, "of course not." But, again, in certain circumstances they would be wrong. I’ll explain in a moment, but first some background. What I’m talking about is a discipline called IT risk management. Risk...

Read More

Security Think Tank: Procurement and security are uneasy bedfellows

Back doors in software can put customer and employee data at risk; poorly coded software can cause outages, brand damage and loss of data; viruses and Trojans in unchecked downloads can cause havoc and untold damage, including handing access to malicious third parties who then have unfettered access to systems.

By Rob Newby 11 November 2013
UK Computer Weekly


Read More

Securing Big Data

Big data can create business value by solving emerging business challenges. However, big data also creates security challenges that need to be considered by organisations adopting or using big data techniques and technologies says Mike Small, FBCS CITP.  There is now an enormous quantity of data in a wide variety of forms that is being generated very quickly. However, the term big data is as much a reflection of the limitations of the current technology as it is a statement on the quantity, speed or variety of data. The term big data needs to be understood as data that has...

Read More

The future of cloud

We asked senior figures in the industry to come together to debate the future of cloud computing in a round table. Present were: Daniel Power, EMEA sales director, Onelogin; Matt Price, VP and general manager EMEA, Zendesk; Mike Small, fellow analyst, KuppingerCole and member of ISACA; Simon Wilcox, director, Digital Craftsmen; Jonathan Wisler, general manager EMEA, Softlayer; and Virginia Blackburn, moderator.

By Virginia Blackburn 25 September, 2013
Quelle: MEDIAPLANET


Read More

EMC Nabs Aveksa, a Player in Identity Management

Tech giant EMC made an interesting acquisition today that is likely to increase attention not on itself, but on another company in the same space. EMC said today that it had acquired Aveksa , a privately held company that specializes in identity management. It’s based in Waltham, Mass., and has significant operations in India. First reports of the deal came from the Times of India, which said EMC paid $225 million . Aveksa will become part of RSA, the security division of EMC. By Arik Hesseldahl 8 July 2013 AllThings D

Read More

Security Think Tank: Prism – Sitting duck or elaborate honeypot?

As I write, a handful of slides have been published, appearing to detail websites that are being monitored by the US National Security Agency (NSA), including Google, Facebook, Yahoo, Hotmail, Apple and Skype. What appears to be an acronym – Prism – appears throughout, along with the official seals and protective markings to suggest it is a bona fide US government presentation...

By Rob Newby 2 July 2013
UK Computer Weekly


Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

Modern Cybersecurity Trends & Technologies Learn more

Modern Cybersecurity Trends & Technologies

Companies continue spending millions of dollars on their cybersecurity. With an increasing complexity and variety of cyber-attacks, it is important for CISOs to set correct defense priorities and be aware of state-of-the-art cybersecurity mechanisms. [...]

News