Personal Data Protection

Blog

Consumer Identity Summit 2016 - Summary

KuppingerCole just concluded our first Consumer Identity Summit in Paris.  In fact, this was the first Consumer focused digital identity event of its kind.  The event was very well attended, and featured excellent expert speakers from all across the globe.  The popularity of…

Webcast

Katryna Dow - Privacy by Design & the API-of-Me

Leadership Compass

Leadership Compass: CIAM Platforms - 71171

Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms.  Your compass for finding the right path in the market.

Conference

Nov 22 - 23, 2016: Consumer Identity Summit

Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access…

Blog

Strong Online Identities and Identity Sovereignty

What is a strong online identity? A strong online identity can be defined as a combination of identification, authentication technologies along with personal identity data store capabilities which enables a strong and resilient correlation of digital identities to a physical person, entity…

Blog

A Good Day for US Cloud Service Providers. And for Their Customers.

Back in 2014, a US court decision ordered Microsoft to turn over a customer’s emails stored in Ireland to an US government agency. The order had been temporarily suspended from taking effect to allow Microsoft time to appeal to the 2nd US Circuit Court of Appeals. I wrote a post on…

Workshop

Dec 07, 2016: Der neue Datenschutz – Crashkurs für IT-Professionals

In weniger als eineinhalb Jahren tritt die neue Datenschutzgrundverordnung der EU (EU-DSGVO), besser bekannt unter der englischen Abkürzung GDPR (General Data Protection Regulation), in Kraft. Höchste Zeit also, sich mit den Veränderungen zu befassen, die dieses EU-weit geltende Gesetz…

Blog

GDPR and the post-Brexit UK

The Brexit-Leave-Vote will have substantial influences on the economy inside and outside of the UK. But the impact will be even higher on UK-based, but also on EU-based and even non-EU based organisations, potentially posing a major threat when it comes to various aspects of business.…

Blog

GDPR now!

The news is already getting quieter around the GDPR, the general data protection regulation as issued by the European Union. Several weeks ago it has been discussed in detail in many articles, and background information has been provided by many sources, including lawyers and security…

Congress

May 09 - 12, 2017: European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family…

Blog

Security & Privacy by Design is Agility by Design – time to rethink Banking IT

81 million dollars, that was the sum hackers stole from the central bank of Bangladesh this year in April by breaching the international payment system SWIFT. Three other SWIFT hacks followed quickly in other banks. SWIFT reacted by announcing security improvements, including two-factor…

Blog

The Impact of the new EU Data Protection Regulation on the Finance Industry

After several negotiations und multiple drafts of the General Data Protection Regulation (GDPR), its final text was adopted in April 2016. The GDPR updates the current EU Data Protection Directive according to the technological developments that have taking place during the last 20 years.…

Blog

IoT (or IoEE): Product Security Is Becoming a Strategic Risk

For a long time, IT risks have been widely ignored by business people, including Corporate Risk Officers (CROs) and C-level management. This has changed recently with the increasing perception of cyber-security risks. With the move to the IoT (Internet of Things) or, better, the IoEE…

Webcast

The Need to Destroy in the Era of Populous Data and Cloud

What often gets overlooked in the conversation on cloud security is the subject of “deletability" of cloud data. During this session our expert panel explore the topic of whether cloud data that is “deleted” by an end-­user is actually completely removed from the…

Webcast

Fintech, Insurtech, Supply Chain, Automotive: Use Cases where Blockchain meets IoT and Identity

During the first part of the blockchain track at EIC 2016, we have learned a lot about the concept and technology of Blockchain Identity. In this session we build on this and have a look at what happens in different use case scenarios, if blockchain, the internet of things,…

Webcast

Brendan M. Peter - How Regulation is Driving Digital Transformation and Putting a New Perspective on Identity

We see a development towards the open enterprise with multiple access points to critical information. At the same time, customers and consumers want to make sure their information is kept confidential and secure. As result, there is an increasing focus on identity and access management.…

Webcast

Dr. Karsten Kinast - Making Sense of the EU General Data Protection Regulation

The cloud is coming to your business, like it or not. With cloud-based systems come inherent challenges. These are further complicated as personal data subject to privacy regulation inevitably moves into the cloud. This combination, putting private information into the cloud, creates risk…

Webcast

Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Advisory Note

Advisory Note: Integrating Security into an Agile DevOps Paradigm - 71125

Developing secure and robust applications and deploying them continuously and cost effectively? All organizations, digital or those undergoing a digital transformation, are facing these challenges though the answers are not straightforward. This document describes agile approaches to system…

Webinar

May 03, 2016: Digital Transformation: Why Security and Privacy Matter

Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Don’t Blame the Cloud for Capital One’s Troubles

After the recent Capital One breach, some commentators have suggested that cloud security is fundamentally flawed. Like many organizations today, Capital One uses Amazon Web Services (AWS) to store data, and it was this that was targeted and successfully stolen. In the case of Capital One it was process, not technology, that failed. The company failed on three points to secure its data properly using the extended tool sets that AWS provides. It relied only on the default encryption settings in [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00