Insights

Digital Transformation

Digital Transformation (DX) is aimed at enabling organizations to succeed in the digital age by gaining or maintaining a competitive edge. This is achieved by improving engagement with and services for employees and customers, and driving productivity and efficiency through the application of digital technologies.

Guide
Guide
Digital Transformation: Strategy and Technology Fundamentals
Digital Transformation is the integration of digital technologies into all products, services, processes, and strategies to enable the business to succeed in the digital age.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Webinar
Webinar
Are You Prepared for the True AD Disaster?
Have you ever experienced a major IT outage caused by issues with directory services such as Microsoft Active Directory? If not, you surely have heard about others that came into trouble here....
Learn more
Blog
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
Learn more
Advisory Note
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
Learn more
Event Recording
Event Recording
Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these...
Learn more
The Bletchley Declaration: The Imitation Game of a Different Kind
Blog
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments...
The Human Vector
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
The Future of Identity Security: PAM+CIEM+ITDR
Webinar Recording
The Future of Identity Security: PAM+CIEM+ITDR
Join identity and experts at KuppingerCole Analysts and BeyondTrust as they discuss the impact of the evolution of business IT, the trends shaping the identity landscape, the importance of...
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
Analyst Chat
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
In this episode, Marina discusses the intricacies of synthetic data, AI-generated datasets that mimic real data without revealing personal information. Marina and Matthias explore its significant...
GPTs, Databases, and AI Agility
Blog
GPTs, Databases, and AI Agility
How to reconcile Generative AI proliferation with security and compliance requirements? Let's have a look at several potential approaches...
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and...
Architecting Your SOC to Defend Against Today's Attack Vectors
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
A Secure Supply Chain is Impossible. Here is why.
Blog
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But...
Securing the Digital Universe: Where Do We Even Start?
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
Tanium XEM Platform
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
1 2 3 4 5 6 7 Next