KuppingerCole Analysts

By KuppingerCole Analysts

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 375

Description

KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence.

Episode Date
Analyst Chat #280: What you can expect for IAM in 2026 and Beyond
Dec 08, 2025
Mastering WAAP with Qrator Labs: Defending Against Bots, Attacks & DDoS
Dec 04, 2025
Analyst Chat #279: Apple Wallet Digital IDs - Why This Is Progress, Not a Breakthrough
Dec 01, 2025
Analyst Chat #278: Why Data Provenance Will Define the Next Phase of AI Compliance
Nov 24, 2025
Analyst Chat #277: Mastering IT Governance - Strategy, Compliance & the 1.5 Line of Defense
Nov 17, 2025
Mastering Cyber Resilience with ThreatLocker: How to Stay Secure During the Holidays
Nov 12, 2025
Analyst Chat #276: IPSIE Explained - Secure & Interoperable Identity
Nov 10, 2025
Analyst Chat #275: Designing IAM for 2040 - Orchestration, Signals, and Agility
Nov 03, 2025
Analyst Chat #274: Halloween Cybersecurity Special - From Scare to Insight
Oct 31, 2025
Cyber Resilience
Oct 28, 2025
Analyst Chat #273: Why Your IAM Program Needs a Target Operating Model
Oct 13, 2025
Analyst Chat #272: Will AI Agents Be the Foundation of the Next Security Revolution?
Oct 08, 2025
Analyst Chat #271: From Breach Fatigue to Resilient Architecture - Rethinking Data Trust
Sep 29, 2025
Ghost Tapping: A New Front in Identity Security Risk
Sep 25, 2025
Analyst Chat #270: KPIs vs KRIs in IAM - Metrics That Drive Business Outcomes
Sep 22, 2025
Analyst Chat #269: Do We Really Need IVIP? Identity Fabric vs. Buzzwords
Sep 15, 2025
Analyst Chat #268: Interoperability by Design - Making IAM Work Across Legacy, SaaS, and Multi-Cloud
Sep 08, 2025
Mastering DDoS Defense with Qrator Labs: Evolving Threats & Mitigation Strategies
Sep 05, 2025
Analyst Chat #267: ITDR & Machine Identities (NHIs) - Rethinking IAM for Security at Scale
Sep 01, 2025
Analyst Chat #266: IAM Maturity and Capability-Centric Planning in Practice
Aug 25, 2025
How FRIP Weaponizes Identity Fabrics: The Security Revolution Hiding in Plain Sight
Aug 22, 2025
Analyst Chat #265: Avoid Making IAM the Default Container for Unresolved Ownership
Aug 18, 2025
Analyst Chat #264: Persistent Identity, Ephemeral Secrets - Workload Identities in the Age of AI
Aug 11, 2025
Analyst Chat #263: Third-Party Access - Securing the Weakest Link in Your Identity Strategy
Aug 04, 2025
​​Oracle Database@AWS: Combining the Best of Both Clouds​
Aug 01, 2025
Palo Alto + CyberArk? A Strategic Expansion Into Identity Security — But With Questions
Jul 30, 2025
Analyst Chat #262: Using Identity Fabric to Align Stakeholders and Strategy
Jul 28, 2025
Analyst Chat #261: From Silos to Strategy - Building Modern Identity Fabrics
Jul 21, 2025
Analyst Chat #260: Servant Leadership for CISOs - Better Security & Business Outcomes
Jul 14, 2025
Non-Human Identity Management: Mature or Just Getting Started?
Jul 10, 2025
Analyst Chat #259: Why API Security is the New Cybersecurity Imperative
Jul 07, 2025
Analyst Chat #258: Defining Identity - Beyond Secrets, Credentials, and Accounts
Jun 30, 2025
Analyst Chat #257: Detecting Deception - A CISO's Guide to Modern Threat Detection
Jun 24, 2025
Notes from Cybersec 2025: The EuroStack Vision
Jun 23, 2025
Analyst Chat #256: Organizational Identity & B2B Fraud - Rogue Merchants, PPP Scams, Digital Trust
Jun 16, 2025
Third-Party Risk Is the New Front Door, M&S Supply Chain Breach Shows
Jun 11, 2025
Analyst Chat #255: Looking back at EIC 2025 with Christie Pugh
Jun 10, 2025
What to Expect from Deepfake Threats and How Likely are We to Develop Effective Detection Tools?
Jun 03, 2025
Analyst Chat #254: Operationalizing the Identity Fabrics and Reference Architecture
Jun 02, 2025
Microsoft’s Cloud Sovereignty Promises: Progress or Patchwork?
May 27, 2025
Analyst Chat #253: Looking back at EIC 2025 with Patrick Teichmann
May 26, 2025
Analyst Chat #252: Looking back at EIC 2025 with Dr. Phillip Messerschmidt
May 19, 2025
Analyst Chat #251: EIC 2025 - Navigating the Future of Digital Identity and Cybersecurity
Apr 28, 2025
Analyst Chat #250: Introducing the KuppingerCole Cybersecurity Fabric
Apr 22, 2025
UK Pushes for Apple Backdoor - Court Rejects Total Secrecy in Surveillance Case
Apr 18, 2025
​​Sovereign Cloud Geopolitical Risks
Apr 15, 2025
Analyst Chat #249: Hacking Burnout in Cybersecurity with AI-Induced Flow State
Apr 14, 2025
Analyst Chat #248: Zero Trust and Beyond - Dynamic Authorization in 2025
Apr 07, 2025
Achieving Near Zero MTTR: AI-Driven Automation for Modern Cyber Defense
Apr 04, 2025
Analyst Chat #247: Identity in the Age of AI - Agentic AI, RAG & The Future of IAM
Mar 31, 2025
Analyst Chat #246: The Dark Side of Generative AI - Cyberattacks, Phishing, and Fraud
Mar 24, 2025
Google Acquires Wiz
Mar 22, 2025
​​Federation Without Frustration: Setting the Right Framework for External Identities​
Mar 21, 2025
Analyst Chat #245: Managing Cyber Risks - The Role of Cybersecurity Insurance
Mar 17, 2025
Rage Against the Machines: ITDR and the Rise of Non-Human Identities
Mar 12, 2025
Analyst Chat #244: Post-Quantum Authentication - Preparing for the Next Security Challenge
Mar 10, 2025
Analyst Chat #243: Securing Non-Human Identities - The Role of ITDR in Cybersecurity
Mar 03, 2025
Privacy and Data Protection – Do They Still Belong Together?
Feb 27, 2025
Strong Authentication in a Post-Quantum World
Feb 18, 2025
The Future of Digital Travel Credentials: Trust, Adoption, and the eIDAS 2.0 Framework
Feb 07, 2025
Digital Identity Wallets & Fraud Prevention: Insights from John Erik Setsaas at cyberevolution 2024
Jan 27, 2025
Digital Identity & Innovation: Insights from Justin Richer at cyberevolution 2024
Jan 23, 2025
What’s Next in Customer Identity and Access Management 
Jan 22, 2025
Cybersecurity & Innovation: Insights from Max Imbiel at cyberevolution 2024
Jan 20, 2025
EU DORA Compliance Day Arrives, but Supply Chain Cybersecurity Remains a Major Concern
Jan 17, 2025
Cybersecurity at the Core: A Conversation with Sergej Epp at cyberevolution 2024
Jan 17, 2025
Rethinking Identity Governance and Administration in the Digital Era
Jan 16, 2025
New Year, Same Threats: Hacking the Treasury
Jan 15, 2025
Cybersecurity & Innovation: Insights from Andrzej Kawalec at cyberevolution 2024
Jan 13, 2025
Zero Data Loss: Peace of Mind in the Ransomware Era
Jan 10, 2025
KuppingerCole’s 2024 Highlights: Milestones, Innovations, and Future Focus
Dec 20, 2024
Identity for AI Agents
Dec 18, 2024
Analyst Chat #242: 2025 Cybersecurity Insights - Trends and Solutions
Dec 16, 2024
Cybersecurity in 2025: The Rise of Sophisticated Cyber Attacks
Dec 13, 2024
Building CIAM With Open Standards
Dec 11, 2024
The Marriage of Cohesity and Veritas​
Dec 10, 2024
Shaping the Future of Digital Identity: The KuppingerCole Identity Fabric 2025
Dec 09, 2024
Analyst Chat #241: Cyber Hygiene for Your Personal Life
Dec 09, 2024
The Role of PAM in Modern Cybersecurity
Dec 06, 2024
Analyst Chat #240: From SolarWinds to Zero Trust - Rethinking Supply Chain Security
Dec 02, 2024
Security in the Era of Rapid Digitalization in Operational Technology Environments
Nov 29, 2024
Building Secure APIs with Standards like FAPI, OAuth2, and OpenID Connect
Nov 27, 2024
Analyst Chat #239: Beyond the Firewall - Proactive Cybersecurity with CTI and ASM
Nov 25, 2024
Redefining Cybersecurity: Facing the Next Generation of Threats
Nov 21, 2024
Analyst Chat #238: Cyber Hygiene in the Age of AI
Nov 18, 2024
Digital Divide: The US-China Struggle for Cyberspace
Nov 11, 2024
Analyst Chat #237: Digital Sovereignty or Global Connectivity? The US-China Cyberspace Divide
Nov 11, 2024
Rise of the Machines - Why Machine Identity Management Has Become Essential
Nov 07, 2024
Analyst Chat #236: Surviving the Cryptocalypse - Quantum Risks and Crypto Agility
Nov 04, 2024
Analyst Chat #235: The Human Factor - Addressing Mental Health in Cybersecurity
Oct 28, 2024
Analyst Chat #234: Identity Management in a World of Automated Systems - Machine Identities
Oct 21, 2024
Analyst Chat #233: Going Beyond Identity - A Deep Dive into Zero Trust Security
Oct 14, 2024
Analyst Chat #232: Building a Stronger Cyber Community - Inside KuppingerCole Membership
Oct 07, 2024
Analyst Chat #231: Leading the Cyber Charge - Insights from the CEO and CISO Office
Sep 30, 2024
Analyst Chat #230: Flexibility and Adaptability are Key - Identity Fabric 2025
Sep 23, 2024
Analyst Chat #229: Beyond ChatGPT - AI Use Cases for Cybersecurity
Sep 16, 2024
Analyst Chat #228: Now or Never - Successful Transition From SAP Identity Management
Sep 09, 2024
Analyst Chat #227: Generative AI in SOAR - Balancing Innovation and Responsibility
Sep 02, 2024
Analyst Chat #226: WAF, WAAP, What? The Evolution of Web Application Firewalls
Aug 26, 2024
Analyst Chat #225: Eight Recommendations for CISOs in 2025
Aug 19, 2024
Analyst Chat #224: Identity Security - the Epicenter of Cybersecurity
Aug 12, 2024
Analyst Chat #223: Lessons Learned from the CrowdStrike Incident
Aug 05, 2024
Analyst Chat #222: CIAM Market Update 2024 - Key Developments and Trends
Jul 29, 2024
Analyst Chat #221: AI and Digital Trust - Ensuring Fairness and Transparency
Jul 22, 2024
Analyst Chat #220: Identity Security - A Link between the Identity and Security Worlds
Jul 15, 2024
Analyst Chat #219: Software Supply Chain Security
Jul 08, 2024
Analyst Chat #218: Key Takeaways from Europe's Digital Identity Conference 2024
Jun 10, 2024
Analyst Chat #217: EIC 2024 - Elevating Identity for an Upgraded Reality
Jun 03, 2024
Best Practices for Effective Incident Response
May 29, 2024
Analyst Chat #216: Embracing New Technologies with a Security-First Mindset
May 27, 2024
Analyst Chat #215: From Access Management to ITDR: Market Trends Explored
May 21, 2024
Analyst Chat #214: Strengthening Trust in Identities for Compliance and Security
May 13, 2024
Analyst Chat #213: The Foundation of Secure Communication: Digital Identities in Zero Trust
May 06, 2024
Analyst Chat #212: Securing the Front Door: The Importance of ITDR in Identity Protection
Apr 30, 2024
Analyst Chat #211: From Founding to Future - Celebrating 20 Years of KuppingerCole Analysts
Apr 22, 2024
Analyst Chat #210: Exploring Real-Life Use Cases of Decentralized Identity
Apr 15, 2024
Analyst Chat #209: Behind the Screens - A Day in the Life of a Tech Analyst
Apr 08, 2024
Analyst Chat #208: Understanding Market Segments - KC Open Select's Latest Innovations
Apr 02, 2024
Analyst Chat #207: Leading Cybersecurity - A Day in the Life of a CISO
Mar 25, 2024
The Journey Towards AI-Powered Endpoint Management
Mar 22, 2024
Analyst Chat #206: Access Denied? The Role of Physical Access in Business Resilience
Mar 18, 2024
Analyst Chat #205: From Indelible Ink to Quantum-Safe Computing - Digital Signatures
Mar 11, 2024
Analyst Chat #204: Wallets, Decentralized ID, and Trust - Digital Identity Explained
Mar 04, 2024
Analyst Chat #203: ChatGPT for Cybersecurity - How Much Can We Trust Generative AI?
Feb 26, 2024
Analyst Chat #202: Beyond Traditional Boundaries - Intelligent SIEM solutions
Feb 19, 2024
Analyst Chat #201: Intelligent Defense - Is AI inevitable for Cybersecurity?
Feb 12, 2024
IAM and Cybersecurity Insights and Trends in 2024
Feb 09, 2024
Analyst Chat #200: 200 Episodes - A Cyberspace Odyssey
Feb 05, 2024
Analyst Chat #199: IAM - Orchestration, Convergence, or Both?
Jan 22, 2024
NIS2: What Everyone Needs to Consider
Jan 11, 2024
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Jan 08, 2024
Become Cybersecurity Proactive With Attack Surface Management
Dec 14, 2023
Analyst Chat #197: Inside cyberevolution - A Look Back at the Cybersecurity Conference
Dec 11, 2023
Navigating the Future of API Security: Trends, Challenges, and Innovations
Dec 07, 2023
Analyst Chat #196: AIdentity - The Crucial Link Between AI and Identity
Nov 27, 2023
Analyst Chat #195: Preventing Unwanted Remote Control - Safeguarding RDP Amidst Cyber Threats
Nov 13, 2023
Ein ganzheitlicher Ansatz: Identity Security und XDR
Nov 08, 2023
How Useful is Cybersecurity Awareness Training Really? - Cybersecurity Fact or Fiction Part 2
Oct 31, 2023
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
Oct 30, 2023
Are Boomers Most Vulnerable to Cyber Attacks? - Cybersecurity Fact or Fiction Part 1
Oct 25, 2023
Analyst Chat #193: Dynamic Defenses - Evolving Strategies in Attack Surface Management
Oct 16, 2023
Why You Shouldn’t Just Use IGA for Third Party Access Management
Oct 05, 2023
Analyst Chat #192: Exploring Cloud Security Posture Management (CSPM)
Oct 02, 2023
Analyst Chat #191: The Second Law of AuthN Dynamics
Sep 25, 2023
Analyst Chat #190: Cyberproof Your Business - Unpacking EU's DORA Framework for Digital Resilience
Sep 18, 2023
Analyst Chat #189: Decrypting the Future - How Quantum Computing Will Reshape Cybersecurity
Sep 11, 2023
Analyst Chat #188: Beyond Tradition - The Evolution and Integration of Access Management
Sep 04, 2023
Analyst Chat #187: Securing the Autonomous World 
Aug 28, 2023
The Evolution of PAM: Why We'll Have to Rethink Access Management
Aug 24, 2023
Analyst Chat #186: Cybersecurity in an AI-Powered Digital World - Introducing cyberevolution
Aug 21, 2023
Analyst Chat #185: A New Hope for Cyber Defenders
Aug 14, 2023
Protection Against Multi-Vector DDoS and Bot Attacks
Aug 11, 2023
Analyst Chat #184: Unlock Security for Your Business - Access Control for SAP and Non-SAP Environments
Aug 07, 2023
Analyst Chat #183: The Danger of Deepfakes for Identity Proofing and Growing Misinformation
Jul 31, 2023
Analyst Chat #182: The Rise of AI is Revolutionizing Cyber-Attacks
Jul 24, 2023
Analyst Chat #181: What Comes Next in Cybersecurity?
Jul 17, 2023
Analyst Chat #180: Beyond the AI Hype - Bias, Ethics, and Deepfakes
Jul 10, 2023
Analyst Chat #179: Introducing the KuppingerCole Strategy Navigator
Jul 03, 2023
Analyst Chat #178: Identification of Natural Enemies in the IAM Area: Active Directory and IGA
Jun 26, 2023
Analyst Chat #177: OWASP 2023 - Web Security Today is API Security
Jun 19, 2023
Analyst Chat #176: Key Takeaways from EIC 2023 - Identity, Trust, and Machine Learning
Jun 12, 2023
IT Service Management als SaaS: Effiziente Prozesse und optimales Serviceerlebnis
Jun 07, 2023
Analyst Chat #175: Advancements in Fraud Prevention
Jun 05, 2023
Analyst Chat #174: Access Governance - Ensuring Visibility and Control of User Access
May 29, 2023
Analyst Chat #173: Controlling the Accelerator for Secrets Management
May 22, 2023
Analyst Chat #172: Trends and Predictions for 2023 - The Business Case for Decentralized Identity
May 08, 2023
Lessons to Learn from the Financial Services Industry on Compliance and MFA
May 04, 2023
Analyst Chat #171: Trends and Predictions for 2023 - FIDO2
May 01, 2023
Analyst Chat #170: Trends and Predictions for 2023 - Market Trends in IGA
Apr 24, 2023
Analyst Chat #169: The Future of Data Security
Apr 17, 2023
Analyst Chat #168: Trends and Predictions for 2023 - Next-Generation PAM
Apr 10, 2023
Analyst Chat #167: The Top 5 Ways to Protect Data
Apr 03, 2023
Passwordless: A Step on the Journey
Mar 30, 2023
Analyst Chat #166: Trends and Predictions for 2023 - Policy-Based Access for the Enterprise
Mar 27, 2023
Analyst Chat #165: How GPTs Will Change the Way We Work and Live
Mar 20, 2023
Analyst Chat #164: Trends and Predictions for 2023 - Passwordless Authentication
Mar 13, 2023
What is the Digital Double?
Mar 09, 2023
Analyst Chat #163: Zero Trust in Artificial Intelligence
Mar 06, 2023
Analyst Chat #162: Trends and Predictions for 2023 - Integration of IGA and Data Governance
Feb 27, 2023
Analyst Chat #161: Managing Network Connectivity and Security with SASE Solutions
Feb 20, 2023
Analyst Chat #160: Upgrade Your Security Management Game
Feb 13, 2023
Analyst Chat #159: The 5 Most Common Problems When Choosing a New Tool
Feb 06, 2023
Analyst Chat #158: The Crown Jewels Are a Lie
Jan 30, 2023
Analyst Chat #157: How to Refine Data like Oil - Data Quality and Integration Solutions
Jan 23, 2023
Analyst Chat #156: CIEM Is Entering the Privileged Access Management Market
Jan 16, 2023
Analyst Chat #155: How to Create a Shortlist in 2023
Jan 09, 2023
Continual Access Control, Policies and Zero Trust
Jan 04, 2023
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Dec 19, 2022
Unifying the Perspectives - Application Access Governance
Dec 13, 2022
Analyst Chat #153: Passwordless and Biometrics - Balancing UX with Security and Privacy
Dec 12, 2022
Analyst Chat #152: How to Measure a Market
Dec 05, 2022
Analyst Chat #151: Identity Governance and Administration
Nov 28, 2022
Analyst Chat #150: Clear and Present Danger - Ransomware Threats to Healthcare Providers
Nov 21, 2022
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Nov 14, 2022
Analyst Chat #148: How to Improve Security with Passwordless Authentication
Nov 07, 2022
Analyst Chat #147: How To Manage Your Clients, From Customers and Citizens to B2B and B2B2C
Oct 31, 2022
Analyst Chat #146: Do You Still Need a VPN?
Oct 24, 2022
Analyst Chat #145: How Does Using Cloud Services Alter Risk?
Oct 17, 2022
Analyst Chat #144: What Cybercrime Can Really Mean to Your Business
Oct 10, 2022
Analyst Chat #143: Vulnerability Management: Emergency Patching and How to Deal with "Zero Days"
Oct 03, 2022
Analyst Chat #142: Cyber Resilience: What It Is, How to Get There and Where to Start - CSLS Special
Sep 26, 2022
Analyst Chat #141: What Defines Modern Cybersecurity Leadership
Sep 19, 2022
Analyst Chat #140: Debunking the Myth of the Human Being the Biggest Risk in Cybersecurity
Sep 12, 2022
Analyst Chat #139: Verified Identity Providers
Sep 05, 2022
Analyst Chat #138: Jumpstart Your Zero Trust Strategy With Zero Trust Network Access (ZTNA) Solutions
Aug 22, 2022
Analyst Chat #137: What Is CDP and What Benefit Does It Add to Consumer-Centric Identity Ecosystems?
Aug 15, 2022
Analyst Chat #136: Why Securing Microservices Isn’t as Straightforward as You Might Think
Aug 08, 2022
Analyst Chat #135: Can DREAM Help Me Manage My Multi-Hybrid Infrastructure?
Aug 01, 2022
Analyst Chat #134: How Self-Sovereign Identities Will Influence Public Services
Jul 25, 2022
Analyst Chat #133: Leadership Compass Web Application Firewalls
Jul 18, 2022
Dark Web Monitoring - CYFIRMA on an Undercover Mission
Jul 14, 2022
Analyst Chat #132: Digital Transformation for the Public Sector
Jul 11, 2022
How CYFIRMA Puts Threat Intelligence Into Practice
Jul 05, 2022
Analyst Chat #131: How to protect your OT and IoT from Cybersecurity Threats
Jul 04, 2022
Analyst Chat #130: Leadership Compass Endpoint Protection, Detection and Response (EPDR)
Jun 27, 2022
Analyst Chat #129: Market Compass Secure Collaboration
Jun 20, 2022
Trends, Innovations and Developments in the CIAM Market
Jun 15, 2022
Analyst Chat #128: Characteristics of Future IT
Jun 13, 2022
Analyst Chat #127: Leadership and Challenges in a Changing World
Jun 06, 2022
Analyst Chat #126: Leadership Compass Identity Fabrics
May 30, 2022
Analyst Chat #125: Leadership Compass Access Management
May 23, 2022
Analyst Chat #124: Market Compass Policy-Based Access Management
May 17, 2022
Analyst Chat #123: Market Compass Security Operations Center as a Service
May 02, 2022
Analyst Chat #122: How to Deal with the Increase and Complexity in Consumer Fraud
Apr 25, 2022
Analyst Chat #121: Increasing the Adoption of MFA and Risk-based Authentication
Apr 18, 2022
Analyst Chat #120: Leadership Compass Container Security
Apr 11, 2022
Analyst Chat #119: Composable Enterprises
Apr 04, 2022
Analyst Chat #118: A first look at the new Trans-Atlantic Data Privacy Framework
Mar 30, 2022
Analyst Chat #117: Practical Zero Trust
Mar 21, 2022
Analyst Chat #116: Putting GAIN to the Test
Mar 14, 2022
Analyst Chat #115: From Third-Party Cookies to FLoC to Google Topics API
Mar 07, 2022
Analyst Chat #114: Access Control Solutions for SAP Solutions
Feb 28, 2022
Analyst Chat #113: Data Catalogs and Metadata Management
Feb 21, 2022
Analyst Chat #112: Licensing Strategies for Vendors and Customers
Feb 14, 2022
Analyst Chat #111: From SIEM to Intelligent SIEM and Beyond
Feb 07, 2022
Analyst Chat #110: Cloud Backup and Disaster Recovery Done Right
Jan 31, 2022
Analyst Chat #109: From IT GRC to Integrated Risk Management Platforms
Jan 24, 2022
Analyst Chat #108: Privacy and Consent Management
Jan 17, 2022
Analyst Chat #107: From Log4j to Software Supply Chain Security
Jan 10, 2022
Analyst Chat #106: 2021 - A Retrospective
Dec 20, 2021
Analyst Chat #105: A Deeper Dive into GAIN
Dec 06, 2021
Analyst Chat #104: Edge Computing
Nov 29, 2021
Analyst Chat #103: Data-Centric Security
Nov 22, 2021
Analyst Chat #102: Impressions and Insights From the CSLS 2021
Nov 15, 2021
Analyst Chat #101: DREAM - Policies and Automation for All of Today's IT
Nov 08, 2021
Analyst Chat #100: A Perspective on "Everything as Code"
Nov 01, 2021
Analyst Chat #99: Protecting OT and ICS
Oct 18, 2021
Analyst Chat #98: GAIN and Reusable Identities
Oct 11, 2021
Analyst Chat #97: Low-Code/No-Code and the Citizen Developer
Oct 04, 2021
Analyst Chat #96: How to Combine Security And Convenience (EIC 2021 Special)
Sep 27, 2021
Analyst Chat #95: Deconstructing the User Journey (EIC 2021 Special)
Sep 23, 2021
Analyst Chat #94: From Ransomware to Globally Assured Identities (EIC 2021 Special)
Sep 20, 2021
Analyst Chat #93: Policies and Automation to Secure Your Agile and Dynamic IT Environment
Sep 13, 2021
Analyst Chat #92: How the Cybersecurity Market Is Evolving
Sep 06, 2021
Analyst Chat #91: Vulnerability Management
Aug 30, 2021
Analyst Chat #90: API Management and Security
Aug 23, 2021
Analyst Chat #89: Next-Generation BI Platforms
Aug 16, 2021
Analyst Chat #88: What (and why) is XDR?
Aug 09, 2021
Analyst Chat #87: Data Governance Platforms
Aug 02, 2021
Analyst Chat #86: Zero Trust Means Zero Blind Spots
Jul 26, 2021
Analyst Chat #85: Hybrid IT 4 - Hyperconverged, Edge and Cloud in a Box
Jul 19, 2021
Analyst Chat #84: Hybrid IT 3 - Managing and Governing
Jul 12, 2021
Analyst Chat #83: Hybrid IT 2 - The Challenges
Jul 05, 2021
Analyst Chat #82: Hybrid IT 1 - The Basics
Jun 28, 2021
Analyst Chat #81: Fraud Reduction Intelligence Platforms Revisited
Jun 21, 2021
Analyst Chat #80: AI Service Clouds
Jun 14, 2021
Analyst Chat #79: DNS and Privacy
Jun 07, 2021
Analyst Chat #78: DNS and DNS Security
May 31, 2021
Analyst Chat #77: Don't Manage Access in Active Directory Groups
May 24, 2021
Analyst Chat #76: Do we really need Cloud Infrastructure Entitlement Management (CIEM)
May 17, 2021
Analyst Chat #75: Get Rid of IAM Siloes
May 10, 2021
Analyst Chat #74: The Influence of PAM on WfH, and its Influence on PAM
May 03, 2021
When AI meets IoT: Does the Public Perception Reflect Reality?
Apr 29, 2021
Analyst Chat #73: Cybersecurity Vulnerabilities of Remote Work
Apr 26, 2021
Analyst Chat #72: WfH Global Technology Trends 2021
Apr 19, 2021
Accelerate your Identity's Digital Transformation
Apr 13, 2021
Analyst Chat #71: Cybercriminal Behavior in the COVID Era
Apr 12, 2021
Analyst Chat #70: AdTech and Future Alternatives to 3rd Party Cookies
Apr 05, 2021
Analyst Chat #69: IAM Awareness in Daily Life
Mar 29, 2021
Analyst Chat #68: FloC and the Death of the 3rd Party Cookie
Mar 22, 2021
How Can Privileged Access Management Help Securing the Enterprise?
Mar 19, 2021
Analyst Chat #67: Ensuring Business Continuity for the Cloud
Mar 15, 2021
Analyst Chat #66: Enterprise Authentication - an Updated Look at That Market Segment
Mar 08, 2021
How to Find the Right Strategy for Access Control Management
Mar 04, 2021
Analyst Chat #65: A First Look at Homomorphic Encryption
Mar 01, 2021
Analyst Chat #64: Applying The Zero Trust Principle To The Software Supply Chain
Feb 22, 2021
Where to Start Your IAM Modernization Journey
Feb 18, 2021
Privileged Access Management from a CISO Perspective
Feb 16, 2021
Analyst Chat #63: The Need For New Drivers to Improve Cybersecurity
Feb 15, 2021
Analyst Chat #62: The SOCaaS Market Segment - A First Look
Feb 08, 2021
Analyst Chat #61: Post-SolarWinds Software Security Strategies
Feb 01, 2021
Security in Financial Services
Jan 27, 2021
Analyst Chat #60: The 2021 Trends in DevOps and Security
Jan 25, 2021
Analyst Chat #59: Understanding the SolarWinds Incident and Recommended First Steps
Jan 18, 2021
Encrypt Everything
Jan 13, 2021
Analyst Chat #58: Innovation in CIAM
Dec 14, 2020
Analyst Chat #57: Verified Digital Identities
Dec 07, 2020
Data Security in the Cloud
Dec 02, 2020
Analyst Chat #56: The Project Road Towards Zero Trust - What to Do and Where to Start
Nov 30, 2020
Analyst Chat #55: What Keeps Organizations From Adopting Zero Trust
Nov 23, 2020
The Interplay between Zero Trust and IAM
Nov 18, 2020
Analyst Chat #54: Privileged Access in an Agile World - PAM for DevOps
Nov 16, 2020
Analyst Chat #53: Emerging Technologies in Healthcare - Solutions and Use Cases
Nov 09, 2020
Analyst Chat #52: SOAR - A North American Product Only?
Nov 02, 2020
Analyst Chat #51: Emerging Technologies in Healthcare - The Underlying Trends
Oct 26, 2020
Analyst Chat #50: The European Cybersecurity Month - Ensuring Security Beyond Awareness
Oct 19, 2020
Analyst Chat #49: There is More to IAM Processes than JML
Oct 12, 2020
Analyst Chat #48: Policy-based and Dynamic Authorization Management
Oct 05, 2020
Analyst Chat #47: Access policies as the Common Language for Defining Access
Sep 28, 2020
Analyst Chat #46: Business Resilience Management Part II
Sep 21, 2020
Analyst Chat #45: Meet the Citizen Developer
Sep 14, 2020
Analyst Chat #44: Business Resilience Management
Sep 07, 2020
Analyst Chat #43: Privacy and Consent Management
Aug 31, 2020
Analyst Chat #42: Ephemeral Credentials
Aug 24, 2020
Analyst Chat #41: NIST’s Zero Trust Architecture
Aug 21, 2020
Analyst Chat #40: Is Quantum Computing an Imminent Security Threat?
Aug 17, 2020
Analyst Chat #39: The Pros and Cons of Agentless Security
Aug 14, 2020
Analyst Chat #38: An Enterprise Risk Management Primer
Aug 10, 2020
Analyst Chat #37: COVID Response and Decentralized Identity Solutions/Verifiable Credentials
Aug 07, 2020
Analyst Chat #36: Questions to Ask Your Cloud Provider About Security
Aug 03, 2020
Analyst Chat #35: An Overview of Enterprise Information Protection
Jul 31, 2020
Analyst Chat #34: ITSM and IGA - How to Integrate Two Key Infrastructures Right
Jul 27, 2020
Analyst Chat #33: Vendor Consolidation in Cybersecurity
Jul 24, 2020
Analyst Chat #32: Data Management and Data Lineage - The Foundation for Big Data Governance and Security
Jul 20, 2020
Analyst Chat #31: A Cybersecurity Reference Architecture for Your Security Fabric
Jul 17, 2020
Analyst Chat #30: Consent Management Done Right
Jul 13, 2020
Analyst Chat #29: Getting Rid of the Password
Jul 10, 2020
Analyst Chat #28: A Holistic View of Cybersecurity - Introducing the Security Fabric
Jul 06, 2020
Analyst Chat #27: NDR - Network (Threat) Detection and Response
Jul 03, 2020
IAM Projects Stalling - Stakeholder Management
Jul 01, 2020
Analyst Chat #26: Functionalities at the Core of a Privileged Account Management System
Jun 29, 2020
Analyst Chat #25: The Cargo Cult of Cybersecurity
Jun 26, 2020
IAM Projects Stalling - No Big Picture in Mind
Jun 24, 2020
KuppingerCole Analyst Chat: Applying AI Governance
Jun 22, 2020
KuppingerCole Analyst Chat: When is a Security Product not a Security Product?
Jun 19, 2020
IAM Projects stalling - Plan First, Then Execute
Jun 17, 2020
KuppingerCole Analyst Chat: What's AI Governance and Why Do We Need It
Jun 15, 2020
Analyst Chat #21: IAM Requires a Solid Process Framework
Jun 12, 2020
IAM Projects Stalling - Quick Wins and Big Wins
Jun 10, 2020
Analyst Chat #20: PAM - What are Privileged Accounts
Jun 08, 2020
Analyst Chat #19: Identity Vetting - Dealing With the Wave of Fraud During the Pandemic
Jun 05, 2020
Cybersecurity Investment Priorities - Set Your Focus Right
Jun 03, 2020
Analyst Chat #18: Zero Trust from the Cloud
Jun 02, 2020
Analyst Chat #17: How to Avoid Becoming a Phishing Victim During the Pandemic
May 29, 2020
Cybersecurity Investment Priorities - Portfolio Optimization
May 27, 2020
Analyst Chat #16: Enterprise Databases in the Cloud
May 25, 2020
Analyst Chat #15: Zero Trust as a Concept for... Trust and Security
May 22, 2020
Analyst Chat #14: The Alphabet Soup of Security Analytics
May 18, 2020
Analyst Chat #13: Cybersecurity Portfolio Optimization
May 15, 2020
Five Golden Rules for Efficient Virtual Collaboration
May 14, 2020
Why BCM/BCRM and Cybersecurity Must Converge
May 13, 2020
Analyst Chat #12: Incident Response Management
May 11, 2020
Analyst Chat #11: How to Ensure Your Video Conference’s Security
May 08, 2020
AI Governance: What to Consider
May 07, 2020
The 5 Golden Rules of E-Payment
May 06, 2020
Microservices in Identity and Access Management
May 05, 2020
Analyst Chat #10: Making IAM Projects Succeed - The Importance of Project Management
May 04, 2020
Analyst Chat #9: The Dark Side of the API Economy
Apr 30, 2020
Why IAM From the Cloud is the New Normal
Apr 29, 2020
Security Should Not Become a "Business Disabler"
Apr 28, 2020
Analyst Chat #8: Making IAM Projects Succeed - Why You Need a Solution Architecture
Apr 27, 2020
CoronaApp: Time to Act Now, Not to Talk
Apr 24, 2020
Analyst Chat #7: Fraud Reduction Intelligence Platforms
Apr 24, 2020
Zero Trust Paradigm for the Future of Security
Apr 22, 2020
Analyst Chat #6: Five Key Topics for Cybersecurity
Apr 20, 2020
Analyst Chat #5: Beyond prevention - The Bigger Picture of Cyber Security
Apr 17, 2020
Why Adaptive Authentication is the Future
Apr 15, 2020
Analyst Chat #4: Setting your Cybersecurity priorities right
Apr 14, 2020
Analyst Chat #3: Protecting Your Organization Against Ransomware
Apr 10, 2020
IAM Projects Stalling – Too Tools-Centric
Apr 08, 2020
Analyst Chat #2: Cybersecurity in the Enterprises in the Age of WFH
Apr 06, 2020
IAM Projects Stalling – Too Big to Win
Apr 02, 2020
Analyst Chat #1: How to Protect Data in a Hostile World
Apr 01, 2020
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
Mar 26, 2020
Analyst Chat: Identity & Access Management Challenges - Work From Home Edition
Mar 25, 2020