Can XDR (Extended Detection and Response) Reduce Attack Surfaces?
EXtended detection & response (XDR) blends Endpoint Detection & Response (EDR) and Network Detection & Response (NDR), KuppingerCole explains.
NIST Explains Zero Trust Architecture: A Closer Look
NIST provides a Zero Trust Architecture overview. KuppingerCole provides further context on the Zero Trust discussion for security professionals.
Decentralized Identity: Blockchain vs Directed Graphs
For a decentralized identity solution to succeed, it will likely need to succeed in the enterprise first — rather than going directly to the masses.
What Are Cloud Security Posture Management Tools?
What are Cloud Security Posture Management (CSPM) software solutions, and how might they mitigate risk for MSSPs & customers? KuppingerCole offers perspectives.
API Platforms: Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era — an era of the Identity Fabric. Kuppinger Cole explains.
API Management and Security: No One Stop Shop Yet
What you need to know about API security solutions and associated real-time monitoring and analytics capabilities.
How to Prepare for a Cyber Incident, Data Breach or Hacker Attack?
There are three phases to a cyber incident: (1) Events that led up to the incident, (2) the incident itself & (3) what happens after the incident. KuppingerCole explains best practices for each phase.
Making Sense of the Top Cybersecurity Trends
What the big cybersecurity trends — including artificial intelligence, zero trust, insider threat management, continuous authentication and culture building — really mean.
Artificial Intelligence and Cyber Security
Cyber security products collect vast amounts of data. But finding so-called IOCS (Indicators of Compromise) is a challenge. Can artificial intelligence & machine learning help?