Insights

Data and Information Protection

In today's digitized world, data is often the most valuable asset an organization has. In most enterprises, data is widely distributed: on users' computers, corporate networks, applications in data centers, cloud infrastructure providers, SaaS applications, etc. Data can be unstructured or structured (databases). Data-centric security requires that resources are discovered, classified, encrypted, and protected by policy-based access control systems. 

Webinar
Webinar
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In the high-stakes world of financial institutions, safeguarding sensitive data is paramount. The enemy, however, may lurk within. Join us for an eye-opening webinar as we delve deep into the world...
Learn more
Blog
Blog
Getting a Grip on Your Big Data – Informatica Announces Acquisition of Compact Solutions
Informatica just announced that they agreed to acquire Compact Solutions, a vendor of Enterprise Metadata Management with engineering and professional services being based out of Krakow, Poland....
Learn more
Leadership Compass
Leadership Compass
Data Quality and Integration Solutions
This report provides an overview of the market for Data Quality and Data Integration solutions that help in gathering, integrating, cleansing, improving, and enriching data across the complete...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #108: Privacy and Consent Management
"Privacy and Consent Management" is an exciting topic in a continuously changing market. Annie Bailey has just completed her latest Leadership Compass, which researches this market segment. To...
Learn more
GPTs, Databases, and AI Agility
Blog
GPTs, Databases, and AI Agility
How to reconcile Generative AI proliferation with security and compliance requirements? Let's have a look at several potential approaches...
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
Analyst Chat
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
In this episode, host Matthias Reinwarth is joined by guest Alexei Balaganski to discuss the implications of quantum computing for cybersecurity. The conversation covers the fundamentals of...
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Blog
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a...
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Blog
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various...
Pros & Cons of Anonymity and ZKP -  Do we Know Them?
Event Recording
Pros & Cons of Anonymity and ZKP - Do we Know Them?
Within the digital identity wallet-movement (and especially SSI), there is a lot of focus on proving something about yourself, without revealing anything else, also known as ZKP (Zero-Knowledge...
Defending Cross-Device flows against Illicit Consent Grant Attacks
Event Recording
Defending Cross-Device flows against Illicit Consent Grant Attacks
Cross device flows lets a user initiate an action on one device (e.g. a SmartTV) and authenticate or authorize that action on a trusted personal device (e.g. a mobile phone). Examples includes...
EU-US Data Transfers - Where are we now?
Event Recording
EU-US Data Transfers - Where are we now?
Reduce Certification Fatigue with Effective Role Management
Event Recording
Reduce Certification Fatigue with Effective Role Management
IAM and security leaders end up certifying far more access than necessary, owing to a failure to classify business resources. Furthermore, business users pay the price because they must spend an...
Secrets Management
Leadership Compass
Secrets Management
Secrets Management is a broad subject that covers any protected data or information that must not be divulged to others. In this document the term ‘secret’ refers to a software token, a key pair or...
Analyst Chat #169: The Future of Data Security
Analyst Chat
Analyst Chat #169: The Future of Data Security
In a world where data breaches are becoming more and more frequent, keeping data secure has become an increasingly challenging task. Join Matthias and Alexei Balaganski in this episode as they...
1 2 3 4 5 6 7 Next