"KuppingerCole" Posts

Privacy Seekers Are Really Looking for Life Management Platforms

Imagine a secure digital data store for your identity documents, financial records, credit score, health records, ownership deeds & more.

Can XDR (Extended Detection and Response) Reduce Attack Surfaces?

EXtended detection & response (XDR) blends Endpoint Detection & Response (EDR) and Network Detection & Response (NDR), KuppingerCole explains.

NIST Explains Zero Trust Architecture: A Closer Look

NIST provides a Zero Trust Architecture overview. KuppingerCole provides further context on the Zero Trust discussion for security professionals.

Decentralized Identity: Blockchain vs Directed Graphs

For a decentralized identity solution to succeed, it will likely need to succeed in the enterprise first — rather than going directly to the masses.

What Are Cloud Security Posture Management Tools?

What are Cloud Security Posture Management (CSPM) software solutions, and how might they mitigate risk for MSSPs & customers? KuppingerCole offers perspectives.

API Management and Security: No One Stop Shop Yet

What you need to know about API security solutions and associated real-time monitoring and analytics capabilities.

How to Prepare for a Cyber Incident, Data Breach or Hacker Attack?

Credit: Pixabay

There are three phases to a cyber incident: (1) Events that led up to the incident, (2) the incident itself & (3) what happens after the incident. KuppingerCole explains best practices for each phase.

Making Sense of the Top Cybersecurity Trends

Credit: Getty Images

What the big cybersecurity trends — including artificial intelligence, zero trust, insider threat management, continuous authentication and culture building — really mean.

Blockchain, Identity, Trust and Governance

KuppingerCole is actively researching blockchain and DLT (Distributed Ledger Technology) including its applications to identity, privacy, security — and proper corporate governance. Here’s why.

What Is FIAM (Fake Identity and Access Management)?

FIAM (Fake Identity and Access Management) may sound like a joke. But it is a real thing, complete with technical solutions (using above-board IDaaS and social networks). KuppingerCole explains the details and risks.