Senior Analyst

Warwick Ashford

Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist and editor since 2003, specialising in cybersecurity and privacy since 2012. Warwick has also worked as a freelance radio producer and broadcast journalist, writing and presenting news bulletins on national radio for the South African Broadcasting Corporation.

Latest publications

Webinar Recording
Proactive Cyber Defense with Intelligent SIEM Platforms
March 08, 2024
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security experts, and the rapid pace of change in the business IT and cyber threat environments,…
Blog
Navigating the Identity Landscape in the Era of Internet-Connected Devices: Challenges and Solutions
February 27, 2024
We undoubtedly live in interesting times, at least in terms of technological innovation. And like most things in life, this can either be a blessing or a curse, depending on how we respond to it. Technology certainly provides new opportunities, but these are typically accompanied by a set…
Analyst Chat
Analyst Chat #202: Beyond Traditional Boundaries - Intelligent SIEM solutions
February 19, 2024
In this Analyst Chat episode, Matthias and guest Warwick Ashford explore the shift from traditional to next-gen Security Information and Event Management (SIEM) solutions. Highlighting the limitations of traditional SIEM in the face of evolving cyber threats and complex data landscapes,…
Leadership Compass
Intelligent SIEM Platforms
February 12, 2024
This KuppingerCole Leadership Compass provides an overview of the market for Intelligent SIEM (I-SIEM) Platforms that go beyond traditional Security Information and Event Management (SIEM) capabilities to proactively identify threats and automatically suggest mitigation measures to meet the…
Executive View
Tata Communications MDR
December 19, 2023
This KuppingerCole Executive View report looks at the managed detection and response (MDR) market and at how solutions address key challenges, with a review of the MDR service and related supporting services from Tata Communications.
Event Recording
Panel | It all starts with the Endpoint
November 15, 2023
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as “beyond PC” and “beyond mobile” types of endpoints, including printers. How…
Analyst Chat
Analyst Chat #195: Preventing Unwanted Remote Control - Safeguarding RDP Amidst Cyber Threats
November 13, 2023
Matthias is joined by cybersecurity expert Warwick Ashford to unravel the complexities surrounding Remote Desktop Protocol (RDP) security in the face of rising ransomware attacks. The discussion initiates with an overview of RDP's functionality and its indispensable role in modern…
Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
September 29, 2023
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and automated SOC, and explain the role of ML, LLMs and other forms of AI in extending the capabilities of…
Analyst Chat
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
September 18, 2023
In this episode, host Matthias and guest Warwick Ashford dive into the EU's Digital Operational Resilience Act (DORA). They discuss its impact on the financial sector's cybersecurity and operational resilience, focusing on key objectives and challenges. The conversation also covers…
Advisory Note
EU Digital Operational Resilience Act (DORA)
September 04, 2023
Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption, including cyberattacks. The European Union has put together a framework of requirements in the…
Blog
Future Cybersecurity Threats: Be Prepared
July 18, 2023
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past cyber-attacks reveals that they tend to be cyclic and lack any real innovation. Most…
Analyst Chat
Analyst Chat #181: What Comes Next in Cybersecurity?
July 17, 2023
In this episode, Matthias engages in a conversation with Senior Analyst Warwick Ashford about the future cybersecurity landscape and threats. They discuss the notion that there's "nothing new under the sun" in cybersecurity, exploring how attackers use familiar tools and techniques in new…
Leadership Compass
Managed Detection and Response (MDR)
July 10, 2023
This KuppingerCole Leadership Compass provides an overview of the market for Managed Detection & Response services that manage a collection of cybersecurity technologies for a client organization to provide advanced cyber threat detection and response capabilities, including Security…
Leadership Compass
Data Leakage Prevention
April 03, 2023
This KuppingerCole Leadership Compass provides an overview of the market for Data Leakage Prevention (DLP) and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor functionality, essential capabilities, and innovative…
Blog
Managing Privileged Access in Complex IT Environments for Business Benefit
April 03, 2023
Ensuring that only authorized individuals can access IT systems and data is at the core of cybersecurity, especially as most successful cyber-attacks are enabled by the abuse of stolen credentials. Access management, therefore, is an essential part of any cybersecurity strategy, but in the…
Analyst Chat
Analyst Chat #167: The Top 5 Ways to Protect Data
April 03, 2023
Protecting data is a responsibility for any company, regardless of whether it is considered their most valuable asset or not. Data loss can occur due to human error or malicious intent, emphasizing the need for comprehensive protection measures. In this episode of the Analyst Chat, Warwick…
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
March 02, 2023
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service (SOCaaS) market in the UAE that continues to develop in response to demand for security monitoring,…
Blog
CIAM: Balancing security and user experience to get value from customer data
February 13, 2023
Business is increasing going online in the digital and post-pandemic era, and as a result, the collection, protection, and management of consumer and customer information has become extremely important. But keeping sensitive data like personally identifiable information private, safe,…
Blog
Gear Up for the Future with Decentralized Identity
January 25, 2023
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to reduce the administrative load during onboarding or ongoing verification of credentials. One…
Blog
IGA, the key to security and compliance
November 29, 2022
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become increasingly reliant on complex IT environments. Key to achieving both data security and…
Blog
Reducing Risk Through Effective Access Management
November 22, 2022
Business is increasingly reliant on IT, from critical line-of-business applications, productivity and collaboration applications to e-commerce, and online customer services. In the modern world, it is more important than ever to ensure that the right people have access to the right systems…
Blog
The Evolving Role of the CISO
November 15, 2022
The role of the Chief Information Security Officer (CISO) has long been a topic for debate. Almost ever since the role first emerged as organizations saw the need to focus on information security, there has been discussion about the how role could or should evolve. With information…
Blog
Cyber Resilience
November 08, 2022
In the post-pandemic world, most people understand the concept of resiliency, which refers to the capacity to recover quickly from some form of adversity - be that Covid-19 infection, cyber-attack, natural disaster, geo-political tensions, and even cyber and kinetic conflict. Business…
Blog
Passwordless Authentication
October 25, 2022
Passwords have not been fit for purpose for a long time. They are too easy to guess, crack, discover, and steal. Passwords are also costly and time consuming to manage, and password reuse is a major problem. However, after talking about getting rid of passwords for years, it is beginning to…