Navigator
Customer Data Platforms Key to Seamless Omni-Channel Experiences
by Roland Bühler
The digital era has ushered in an exciting new chapter in consumer experiences, but it can be challenging for organizations to deliver the seamless customer journey across various analog and digital touchpoint that consumers now expect. To remain competitive, organizations are seeking to engage customers with highly personalized marketing messages and recommendations, and to provide the right information at the right time. However, many organizations struggle to do this because customer information is often distributed across several different departments in databases that are often...
Blog
Human Factor in Cybersecurity: The Weakest Link?
by Alejandro Leal
The Human Factor Cybercriminals often exploit our human vulnerabilities and psychological elements to steal credentials and gain unauthorized access. Since phishing and social engineering attacks are primarily targeted at people, the human factor continues to be an important element CISOs need to consider in order to protect their organizations from cyber-attacks. Most data breaches are caused by human error, negligence, or lack of awareness, for example, by simply clicking the wrong link. So, it is common for employees to increase their digital footprint without being aware of the...
Blog
Finally, the Multi-cloud We’ve Been Waiting For
by Alexei Balaganski
“Multi-cloud” is a tricky term. At its face value, it simply means that your organization is using cloud services from more than one provider, right? But if it’s that trivial, why are so many people talking about “multi-cloud strategies” and why do entire market segments exist only to make managing your multi-cloud deployments slightly less unbearable? According to Flexera , over 90% of organizations have a multi-cloud strategy, and on average, a business is using the services of 2.6 public cloud providers. But of course, the number alone is not what...
Navigator
Getting to Grips with Zero Trust Network Access Solutions
by Warwick Ashford
A Zero Trust approach to cyber security is a concept that has been around for decades, but thanks to advances in technology and the need to adapt cyber security capabilities to support secure hybrid working models and ways of doing business in the digital era, it has never been more relevant. As businesses embrace Digital Transformation and become increasingly cloud-native, mobile, and interconnected, the corporate network perimeter is gradually disappearing, exposing users to malware, ransomware, and other cyber threats. Traditional perimeter security tools no longer provide adequate...
Navigator
Future Proof Your Organization with Policy-Based Access Management
by Warwick Ashford
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem and across multiple cloud environments. Most modern companies tend to struggle with access management for a variety of reasons. These include the fact that it is difficult to make the necessary connections to the many disparate IT systems for which they need to provision access, role-based access management is challenging, static role-based entitlements are difficult to manage and typically...
Blog
The 3 Essentials of a Cyber Leader
by Raj Hegde
Digital leaders face new challenges: a volatile political situation, an uncertain economic climate, and a new paradigm in the way their employees work. Raj explains how we identified the core qualities cyber leaders need in our times and how the Cybersecurity Leadership Summit was designed to give digital leaders the tools they need to take up those challenges. The Three Core Qualities of a Cyber Leader in Our Day and Age At the Cybersecurity Leadership Summit, we help you develop the core qualities of a digital leader. What are they? Leadership: learn how to...
Navigator
Business-Critical Web Application Firewalls
by Warwick Ashford
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical, something that all organizations should be taking into account. Web Application Firewalls (WAF), therefore, are as relevant as ever, if not even more important than when they were first introduced for their ability to protect against or block a long list of common traditional web attacks such as SQL injection. Although they have been around for decades, WAFs cannot be discounted as outdated or...
Blog
Speaking in Cybersecurity: My Recollection!
by Christopher Schütze
During my studies and the subsequent first years of my career, I was already always someone who liked to share knowledge with others and present interesting topics. This is not the only reason why my profession has developed in the direction of IT consulting. In fact, in consulting, "being on stage" is part of the daily work. You present results in front of smaller and larger groups, you become more and more of an expert on a topic, and then at some point, you slide onto the bigger stage at small and large conferences. 3,5 years ago, I joined KuppingerCole and there, giving speeches on big...
Blog
SBOM - A First Step in Software Supply Chain Security (SSCS)
by Richard Hill
Software Bill of Material (SBOM) tools have come sharply into focus as a foundational component of any Software Supply Chain Security (SSCS) strategy, spurred on by the U.S. Executive Order to improve the security of the software supply chain. This was in response to a number of highly visible attacks on the software supply chain of some well knows software products and services, such as SolarWinds in 2020, as well as compromised open-source code and other backdoors embedded in routine maintenance updates. As part of the overall enhancement to SSCS, the Executive Order specifically...
Navigator
Securing Industrial Control Systems (ICS)
by Warwick Ashford
Cybersecurity has become essential for every modern business, but has historically focused on securing information technology (IT) used by the administrative side of the business, rather than operational technology (OT) used to manage industrial operations in manufacturing plants, mining operations, chemical plants, and the like. However, in recent years, OT has evolved, expanded, and become more interconnected and integrated with IT than ever before. Most industrial systems now have digital controls and are connected to IT systems and networks to enable remote monitoring, data...
Previous
2 3 4 5 6 7 8 Next