Privacy Seekers Are Really Looking for Life Management Platforms
Imagine a secure digital data store for your identity documents, financial records, credit score, health records, ownership deeds & more.
Can XDR (Extended Detection and Response) Reduce Attack Surfaces?
EXtended detection & response (XDR) blends Endpoint Detection & Response (EDR) and Network Detection & Response (NDR), KuppingerCole explains.
NIST Explains Zero Trust Architecture: A Closer Look
NIST provides a Zero Trust Architecture overview. KuppingerCole provides further context on the Zero Trust discussion for security professionals.
Decentralized Identity: Blockchain vs Directed Graphs
For a decentralized identity solution to succeed, it will likely need to succeed in the enterprise first — rather than going directly to the masses.
What Are Cloud Security Posture Management Tools?
What are Cloud Security Posture Management (CSPM) software solutions, and how might they mitigate risk for MSSPs & customers? KuppingerCole offers perspectives.
API Platforms: Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era — an era of the Identity Fabric. Kuppinger Cole explains.
API Management and Security: No One Stop Shop Yet
What you need to know about API security solutions and associated real-time monitoring and analytics capabilities.
How to Prepare for a Cyber Incident, Data Breach or Hacker Attack?
There are three phases to a cyber incident: (1) Events that led up to the incident, (2) the incident itself & (3) what happens after the incident. KuppingerCole explains best practices for each phase.
Making Sense of the Top Cybersecurity Trends
What the big cybersecurity trends — including artificial intelligence, zero trust, insider threat management, continuous authentication and culture building — really mean.