
Privacy Seekers Are Really Looking for Life Management Platforms
Imagine a secure digital data store for your identity documents, financial records, credit score, health records, ownership deeds & more.

Can XDR (Extended Detection and Response) Reduce Attack Surfaces?
EXtended detection & response (XDR) blends Endpoint Detection & Response (EDR) and Network Detection & Response (NDR), KuppingerCole explains.

NIST Explains Zero Trust Architecture: A Closer Look
NIST provides a Zero Trust Architecture overview. KuppingerCole provides further context on the Zero Trust discussion for security professionals.

Decentralized Identity: Blockchain vs Directed Graphs
For a decentralized identity solution to succeed, it will likely need to succeed in the enterprise first — rather than going directly to the masses.

What Are Cloud Security Posture Management Tools?
What are Cloud Security Posture Management (CSPM) software solutions, and how might they mitigate risk for MSSPs & customers? KuppingerCole offers perspectives.

API Management and Security: No One Stop Shop Yet
What you need to know about API security solutions and associated real-time monitoring and analytics capabilities.

How to Prepare for a Cyber Incident, Data Breach or Hacker Attack?
There are three phases to a cyber incident: (1) Events that led up to the incident, (2) the incident itself & (3) what happens after the incident. KuppingerCole explains best practices for each phase.

Making Sense of the Top Cybersecurity Trends
What the big cybersecurity trends — including artificial intelligence, zero trust, insider threat management, continuous authentication and culture building — really mean.

Blockchain, Identity, Trust and Governance
KuppingerCole is actively researching blockchain and DLT (Distributed Ledger Technology) including its applications to identity, privacy, security — and proper corporate governance. Here’s why.

What Is FIAM (Fake Identity and Access Management)?
FIAM (Fake Identity and Access Management) may sound like a joke. But it is a real thing, complete with technical solutions (using above-board IDaaS and social networks). KuppingerCole explains the details and risks.