Subscribe To Our Daily Enewsletter:

Posts by KuppingerCole

Recent Cyberattack Against German Government Network: No Surprise

Is the German government network as super secure as the government claims? Obviously not. It might even be above average. But every network is vulnerable to attacks.

GDPR and Financial Services – Imperatives and Conflicts

GDPR emphasizes transparency and the rights of data subjects. Those focus areas may lead to conflicts with the other compliance directives. Kuppinger Cole explains why.

European Banking Authority (EBA) Rules Out Secure Open Banking?

It seems perverse that technical regulations associated with the opening of electronic payment services may inhibit modern cybersecurity measures.

Free Software Tools That Can Save Millions? We Need More of These

The number of security risks a business-critical database faces is surprisingly large. Can free tools assist?

Please: No More GDPR Related Compliance Deadline Blog Posts!

Set up an email client filter that sorts GDPR messages directly into spam … but only if you’ve truly started your journey towards GDPR compliance early.

More Than Buzzwords: Cyber Risk Governance

Cyber risk governance requires strong executive leadership, a strategic framework for associated processes and related technological components.

GDPR Compliance: 72 Hour Data Breach Notification Rule Is Good Idea

GDPR will require organizations to notify the Supervisory Authority (SA) of a data breach within 72 hours of discovering the breach. Can companies comply?

The Cargo Cult of Cybersecurity

The more you pressure vendors for secure design today, the higher the chances tomorrow they will see security by design as their unique selling proposition.

Building Trust as a Foundation for Sustainable Business Strategies

Many organizations have not yet built trusted identity relationships with users, customers, consumers & employees. KuppingerCole says that must change.

The Return of Authorization

Authorization is the act of evaluating whether a person, process or device is allowed to operate on or possess a specific resource.