Subscribe To Our Daily Enewsletter:

Posts by KuppingerCole

API Platforms: Secure Front Door to Your Identity Fabric

Identity and Access Management (IAM) is on the cusp of a new era — an era of the Identity Fabric. Kuppinger Cole explains.

API Management and Security: No One Stop Shop Yet

What you need to know about API security solutions and associated real-time monitoring and analytics capabilities.

How to Prepare for a Cyber Incident, Data Breach or Hacker Attack?

There are three phases to a cyber incident: (1) Events that led up to the incident, (2) the incident itself & (3) what happens after the incident. KuppingerCole explains best practices for each phase.

Making Sense of the Top Cybersecurity Trends

What the big cybersecurity trends — including artificial intelligence, zero trust, insider threat management, continuous authentication and culture building — really mean.

Artificial Intelligence and Cyber Security

Cyber security products collect vast amounts of data. But finding so-called IOCS (Indicators of Compromise) is a challenge. Can artificial intelligence & machine learning help?

Blockchain, Identity, Trust and Governance

KuppingerCole is actively researching blockchain and DLT (Distributed Ledger Technology) including its applications to identity, privacy, security — and proper corporate governance. Here’s why.

Blockchain for Identity Services: Myth or Potential Reality?

There are areas where Blockchain technology has the potential to help solve existing identity problems. KuppingerCole shares the details.

What Is FIAM (Fake Identity and Access Management)?

FIAM (Fake Identity and Access Management) may sound like a joke. But it is a real thing, complete with technical solutions (using above-board IDaaS and social networks). KuppingerCole explains the details and risks.

Azure Advanced Threat Protection: Securing Your Identities Right From the Cloud

Microsoft Azure Advanced Threat Protection (Azure ATP for short) is a cloud-based service for monitoring and protecting hybrid IT infrastructures against targeted cyberattacks and malicious insider activities, KuppingerCole explains.

Recent Cyberattack Against German Government Network: No Surprise

Is the German government network as super secure as the government claims? Obviously not. It might even be above average. But every network is vulnerable to attacks.