Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
KC Open Select
KC Open Select
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats.
Learn more
Blog
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
Learn more
Advisory Note
Advisory Note
Maturity Level for Zero Trust: A Comprehensive Analysis
This Advisory Note explores the fundamental principles of Zero Trust, emphasizing its significance in modern cybersecurity. It discusses the Department of Defense (DoD) Zero Trust Strategy and...
Learn more
Webinar Recording
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture...
Learn more
Quantum Computers: The Ultimate Opponent for Data Protection
Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there's good news: asset management has evolved. Today’s...
Workshop | Implementation of a Risk Class Model Within Access Management
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and...
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Event Recording
Panel | Misinformation – Disinformation – Malinformation (MDM): The Next Big CISO Challenge?
Even though MDM has had a long history during war and times of high tension,  the digital era has been increasing reach and potential impact of weaponized misinformation. Sophisticated tools...
Successfully tackling your Digital Supply Chain Risk
Event Recording
Successfully tackling your Digital Supply Chain Risk
In this talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will provide insights on Digital Supply Chain Risk. He will look at the areas of risks, from secure partner onboarding...
Building Resilience After a Major Incident
Event Recording
Building Resilience After a Major Incident
This presentation will explore resilience measures to be taken immediately after a major incident.
Resilience and the Need for Privacy
Event Recording
Resilience and the Need for Privacy
This presentation will explore the role of privacy in building enterprise resilience.
Risk-Based Cyber Reporting Best Practices
Event Recording
Risk-Based Cyber Reporting Best Practices
Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the...
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Model to Quantify Cyber Security Risks
Event Recording
Model to Quantify Cyber Security Risks
Get a model and recommendations to quantify cyber security risks including the costs of fines, contractual compensations, service credits, and loss of income. The use of heatmaps with...
Previous
4 5 6 7 8 9 10 Next