Featured post
La France est devenue l’un des pays plus avancés au niveau mondial en cyber-sécurité. D’une part, parce que le numérique est au cœur de la chaîne de valeur de la plupart des entreprises et administrations et que les princi...
The changing role of the CISO
In 2018, teknowlogy interviewed 250 IT security decision-makers (CISOs, directors and heads of IT security, and others) on the future role of the CISO. Those interviews were based on a CATI (computer-assisted telephone interview) approach, with professionals from the Americas, EMEA & APAC. In addition to the quantitative study, 11 ...
Usage of artificial intelligence in cyber security
Artificial intelligence (AI) is currently one of the most hyped topics, and this is also the case in cyber security. There are a series of use cases were AI can be used to reduce manual work by humans and increase the level of security due to the ability to monitor 100% of traffic or 100% of actions taken by users – a task that human cyber ...
Customer identity and access management (CIAM): a new killer app
Many innovations need "out-of-the-box" thinking; CIAM is a perfect example – from a simple cyber security tool, i.e. single sign-on (SSO), CIAM platforms have emerged, which efficiently and securely provide web CRM and a single customer view.
DevSecOps, the new normal
The rise of DevOps is the latest evolution of the goal of IT/business alignment, an evolution that is well adapted to the digital needs of businesses and the developments in cloud computing architecture. However, it generates specific cyber security issues. That's where DevSecOps comes into play.
The future is platform-based – insights from the IBM Security Summit 2019
On June 5th, 2019, a radiant summer day in Berlin, teknowlogy visited this year's IBM Security Summit at "Bikini Berlin" – an event taking place as part of the "Think at IBM" event series and providing a whole range of information and insights for the avid security expert. The focus was primarily on IBM's view of the security market and its ...
Synergy 2019: Citrix setzt beim Unified Workspace auf Produktivität, Multi-Cloud und Sicherheit - Teil 2
Lesen Sie im zweiten Teil unseres Beitrags zur Synergy 2019 über Citrix Analytics for Performance, über Citrix' Offenheit für Anwendungen von Cloud-Plattformen sowie unser Fazit zur Synergy 2019.
Synergy 2019: Citrix setzt beim Unified Workspace auf Produktivität, Multi-Cloud und Sicherheit - Teil 1
Der als VDI (Virtual-Desktop-Infrastructure)-Spezialist bekannte Softwareanbieter Citrix setzt den im letzten Jahr eingeschlagenen Kurs fort, den digitalen Arbeitsplatz produktiver zu gestalten. Mit dem erweiterten Lösungsportfolio wendet sich der Hersteller an Unternehmen, die bestrebt sind, die Produktivität ihrer Fachkräfte zu steigern ...
Hits the European cyber security market like a thunderbolt: Orange Cyber Defense to acquire SecureLink
On May 8, Orange Cyber Defense (OCD), one of the leading cyber security service providers in Europe, announced its plans to acquire SecureLink, the leading cyber security service provider in the Benelux region, with offices in the UK, in Germany and in Scandinavia. This acquisition will make OCD the second biggest cyber security player in ...
Identities are the new perimeter: why IAM is more important than ever
Identity and access management (IAM) is becoming increasingly important across all industries since it is a core element of IT security, dealing with one of the most prevalent vectors, the human identity.
Key issues in cyber security for utilities
Utility companies across the world are in the midst of their digital transformation process. Predictive and condition-based maintenance, an increase in efficiency and line/pipe loss reductions are often based on IIoT solutions and IT/OT integrations, while other improvements rely on artificial intelligence, big data analytics and customer ...
Endpoint security for the workplace of the future
Workplaces and their related endpoint security have changed dramatically over the last two years and will continue to do so for the foreseeable future. While traditional virus and malware protection are ubiquitous security measures, additional means are available and needed to protect endpoints in a holistic manner.
In the spirit of partnership: insights from the first Cyber Security Tech Summit Europe in Bonn
The very first Cyber Security Tech Summit took place at the World Congress Center Bonn on March 13-14, 2019. This summit was hosted by the recently founded Cyber Security Cluster, an interdisciplinary network of players who want to make the world a better place in terms of cyber security, including Deutsche Telekom, the Fraunhofer Institutes ...
The Value of Immersive Experiences in Cyber Security
Yesterday PAC attended a ‘cyber security immersive experience provided by the IBM X-Force Cyber Tactical Operations Center team’. In plainer language, this means that we were given the opportunity to experience a role-play exercise in cyber security that is normally reserved for IBM’s board-level prospects and clients.
Les 10 concepts qui feront buzzer l'IT en 2019
2019 sera l’année où l’on se pose les questions fondamentales. Au sens propre, d'ailleurs : quelles sont les fondations nécessaires pour mettre en œuvre de façon pérenne les programmes de transformation numérique ?
How Honeywell is enabling the digital transformation of industrial processes
At this year’s Honeywell Users Group (HUG) conference, Honeywell Process Solutions presented its approach of enabling its customers (e.g. oil, gas and chemical companies) to take advantage of new technologies to optimize their production processes. Besides, the increasingly important topic of industrial cyber security was discussed.
The transformation of cyber security: how to deliver the new cyber security paradigm
Back in the Renaissance, new chances arose from new trade routes and the world started growing together. The same happens today: in our digital era, new opportunities abound, but just as back then, pirates and corsairs are lurking out there to seize those riches. To protect the digital world from those threats, cyber security needs to ...
Cyber security in healthcare - key issues and trends
Cyber attacks have been on the rise in the past few decades. The reasons are numerous, but they all boil down to the increase in digitalization and the associated massive availability of data, rendering cyber security one of the major issues in today’s digitized world. The number of cyber attacks in the healthcare sector has exponentially ...
Key cyber security issues in the aerospace & defense industry
The aerospace & defense industry has a very specific business where security plays a key role. Cyber security issues are also very specific, and the level of expectation as regards cyber security is quite often very high.
Key cyber security issues in digital finance
Financial institutions across the world are in the midst of their digital transformation process, already being strongly IT-centric. However, a lot of them have come to find that one of their key business assets, i.e. security, may actually turn into a risk in the cyber space, with strong impacts on IT and business.
Do you need a CASB?
“Cloud Access Security Broker” (CASB) is among the most frequently used buzzwords in the field of security in 2018. Why is that? The answer is quite simple: cloud computing still presents a huge vulnerability for most enterprises, but it is also the foundation of any kind of digital transformation.