Media Coverage

Unstructured data compliance: Obstacles and solutions

Data scientists estimate that 80% of the world’s electronic information is “unstructured”, or held as email, documents, video and photographs, or even free text. “ Unstructured data is data held outside data structures like tables and rows without predictable content patterns, such as documents, emails, photos or free text,” says Jacob Isaksen, a digital forensics expert and founder and CEO of Avian, a consulting firm based in Copenhagen. Or, as Mathieu Gorge, CEO of compliance specialists Vigitrust puts it, unstructured data looks rather...

Read More

EIC: European Identity & Cloud Conference 2019 in Munich

For us as a PR agency specialized on technology and cybersecurity, the EIC has long been a must-attend every year, and so it is for all our clients dealing with IAM, cloud technology, artificial intelligence or digital transformation. The EIC offers a unique mix of best practices, visionary presentations and networking opportunities for a future-oriented community. This May, around 850 international thought leaders, leading vendors, analysts, visionaries, executives and end-users got together in Munich to be inspired by a list of world-class speakers. Our client Thycotic, a provider...

Read More

Cybersecurity Leadership Summit und Cyber Access Summit 2019

Cybercrime is the greatest threat to every company in the world, making cybersecurity the hottest issue of mankind. This notion is corroborated by the fact that VCs are almost doubling their investments in cybersecurity firms. As the threats, starting from the reputational harm and destruction of data to identity theft, rise, cost of defending yourself in cyberspace grows vastly and preventive solutions towards this issue become imminent. Major data breach incidents are becoming more frequent making us feel insecure and doubtful (hesitant).  The way we navigate ourselves in this...

Read More

Datensicherheit ist Teamwork

Die Zeiten sind vorbei, in denen die IT-Abteilung alleine die Systeme eines Unternehmens schützen konnte. Angesichts des enormen Risikos muss die Verteidigung gegen Cyberkriminalität ein zentrales Anliegen für alle Mitarbeiter sein, von der Rezeption bis hin zum CEO. Das birgt allerdings eigene Risiken, die jedoch durch den Einsatz neuer Technologien eingedämmt werden können. Das Umfeld dieses Bereichs wird heute von einer ständig wachsenden Anzahl von „Angriffsvektoren“ bestimmt, von denen der neueste das Mining von Crypto-Währungen ist...

Read More

Data Security is a team effort

Gone are the days when an IT department alone was able to protect a company’s systems. Given the enormous risk, fending off cyber criminals must be of central concern to all employees, from the receptionist to the CEO. But that brings its own risks, which can be curtailed by emerging technologies. Today’s landscape is teeming with an ever-growing number of “attack vectors”,  with the newest being crypto-currency mining – a kind of cyber-attack that grew by an astonishing 4,000 per cent in 2018, according to McAfee . “A successful...

Read More

CipherCloud Extends Zero Trust Cloud Security to Email for Office 365 and G Suite

CipherCloud, a leader in cloud security, today announced new email security capabilities in its CipherCloud Zero Trust CASB+ platform, combining zero trust threat prevention with industry leading data protection technologies In addition to the new email security, the CipherCloud platform provides innovative adaptive control enforcing zero trust cloud security with continuous risk assessment; zero-day threat protection and real-time blocking; and machine learning that detects compromised credentials and anomalous behaviors across cloud applications. The platform seamlessly extends...

Read More

Advanced Authentication Market 2019: Company Profiles, Emerging Audience, Industry Segments, Size, Landscape and Demand by Forecast to 2023

Global Advanced Authentication Market is estimated to grow at a CAGR of 12% during the forecast period 2017-2023 Advanced Authentication Market Highlights: A number of credentials systems are used in the market to gain access such as username or password, which can access multiple systems by saving them in database. However, in the recent years many high profiles breaches were reported, which triggered awareness among public about importance of security measures. Thus, security firms and IT developers are more focused on developing advanced authentication techniques, which can...

Read More

API Security Weekly: Issue #33

First American Financial Corp.  was leaking 885 million mortgage deals records until it was notified by KrebsOnSecurity last week. The leaked records included highly sensitive information such as social security numbers (SSN), bank accounts, tax records, and wire details. Presumably, the company did not want to secure the documents to simplify the access to them for all parties in a mortgage deal. As a result, the records could be obtained just by putting a sequential document ID parameter in the URL. These parameters were 9-digit integers starting with 000000075 (this one...

Read More

Quicklinks

Welcome to KuppingerCole

How can we help you

Send an inquiry

+49 211 237 077 33

Mo – Fr 8:00 – 17:00

Stay Connected

Spotlight

AI for the Future of your Business Learn more

AI for the Future of your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]

News