Governance, Organization & Policies

Advisory Note

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these…


Does Risk Management really fail in IT Security?

In an article published at Network World Online Richard Stiennon, Chief Research Analyst at a company called IT-Harvest, claims that IT Risk Management inevitably fails in IT. He ends up with recommending “threat management techniques” instead of risk management. He says that it is about…


Pseudonymity means real privacy

In my last posting, I stated that “privacy is not anonymity”. I received a few questions about that, so today I want to elaborate on the subject. Let’s get something out of the way right off the bat – there is not, nor can there be, true “anonymity” on the internet – or almost anywhere…


In search of privacy

Way back in 1999, Scott McNealy – then the chief executive officer of Sun Microsystems – famously said that consumer privacy issues are a "red herring." He went on to say: "You have zero privacy anyway, get over it." Yet just in the past two weeks privacy has been much in the news on many…


Oct 09, 2012: Risiken erkennen und wirksam vermeiden: Integrierte Ansätze und Lösungen für IT Governance Risk Management & Compliance (IT-GRC)

Als böten traditionelle Infrastrukturen mit ihren Schwachstellen und Angriffspunkten nicht bereits genügend Risiken, machen IT-Konsumerisierung, Social Media im Unternehmen und alle damit verbundenen Veränderungen die Ungewissheit zum Standard. Traditionelles Risk Management stößt hier an…


Privacy is back – the discussion about the new German law on citizen registration

Germany has, in contrast to many other countries, a mandatory citizen registration. One side effect is the national ID card (now an eID). Another is that there are registration offices at every local authority. And there is a law called “Melderechtsrahmengesetz” (MRRG) which rules everything…


The Future of IT Organizations – why IT needs a marketing department

Some weeks ago we published a report called “The Future of IT Organizations“. This report talks about how to restructure IT Organizations, following the basic structure we propose for IT in the KuppingerCole IT Paradigm. That paradigm is first described in the KuppingerCole Scenario…

Advisory Note

Advisory Note: Dealing with privacy risks in mobile environments - 70224

The ongoing trend of IT consumerization and deperimeterization has a profound effect on modern society. Mobile devices are becoming increasingly sophisticated and their numbers are growing exponentially. Social networking has made sharing information all too easy and controlling its spread…


EIC 2012 Keynote: Interview - What are the Privacy and Information Security Challenges 2012 and Beyond?

Roy Adar, Vice President of Product Management, Cyber-Ark Dr. Nigel Cameron, CEO, Center for Policy on Emerging Technologies Martin Kuppinger, KuppingerCole Shirief Nosseir, Marketing Manager, CA Technologies Jim Taylor, VP Identity and Security Management, NetIQ April 17, 2012 15:40


EIC 2012 Keynote: The Future of Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet

Prof. Dr. Kai Rannenberg, T-Mobile Chair of Mobile Business & Multilateral Security, Goethe University in Frankfurt April 19, 2012 9:00

Advisory Note

Advisory Note: Life Management Platforms: Control and Privacy for Personal Data - 70608

Life Management Platforms will change the way individuals deal with sensitive information like their health data, insurance data, and many other types of information – information that today frequently is paper-based or, when it comes to personal opinions, only in the mind of the…

Advisory Note

Scenario: The Future of IT Organizations - 70350

When looking at today’s IT, it is driven by some major evolutions. Everything which is done in IT has to take these evolutions into account. One is Social Computing. The second evolution is Mobile Computing. The third evolution is Cloud Computing. All these trends affect IT…


Non-working P3P privacy policies in browsers - whom to blame?

Another recent discussion was about Microsoft blaming Google and Facebook for circumventing IE privacy policies. There were many articles about that issue, two of them you’ll find here:…


Google’s Privacy Policy – the market will decide

There has been a lot of noise around Google changing its privacy policies. My esteemed colleague Dave Kearns said that they just consolidated them. I’ll stay with “changed”, due to the effect of this: Google now can do much more with the user’s data – if the user logs into any Google…


Data Protection and the Cloud

Nowhere is the uncertainty surrounding data protection currently greater than with regard to cloud services. Microsoft is on the right track with its extensive implementation of the EU standard contract clauses, writes Martin Kuppinger. At the end of last year, Microsoft brought its Office…


Privacy by Design

KuppingerCole Webinar recording


Jan 26, 2012: Privacy by Design

2011 was, once again, a bad year for privacy as data breaches releasing usernames, passwords, credit card details and even medical records continued to make news right through the end of the year. Time has proven that no amount of imposed regulation can protect privacy in the face of a…

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00

KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Latest Insights


AI for the Future of Your Business Learn more

AI for the Future of Your Business

AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]



Cybersecurity Awareness – Are We Doing Enough?

Cybersecurity Awareness – Are We Doing Enough?

It’s October and it means that we are having the European Cybersecurity Month again. ECSM is the European Union’s annual campaign dedicated to promoting cybersecurity among EU citizens and organizations. To be completely honest, I do not remember it being much of a thing in previous years, but apparently, in 2020, cybersecurity awareness is much more important for the European Commission and not without, ahem, a very big reason. I have always had mixed feelings about the whole [...]