Zero Trust moves from buzz-word to practical approach as enterprises seek to secure their business

Posted on February 12, 2021

 

We’ve heard a lot about Zero Trust over the years, but the onset of the COVID-19 pandemic moved the buzz word abruptly to the forefront. In part, due to the rapid increase in demand for digital workplaces for remote work, and in part to a rapidly evolving threat landscape, the topic quickly captured C-Suite mindshare. Enabling employers ...

read more

PAC Predictions 2021: Secure Access Service Edge (SASE) wird zum unverzichtbaren Cyber-Service

Posted on January 21, 2021

SASE war ursprünglich im Gespräch als potenzielle, eher theoretische Lösung zur Unterstützung der neu entstehenden Muster bei Netzwerkauslastung und Auslieferung, kombiniert mit stärker verteilter Sicherheit und bereitgestellt als Cloud-ähnlicher Service. In den letzten 12 Monaten hat dieses Konzept am Markt jedoch erheblich an Dynamik ...

read more

PAC Predictions 2021: Secure access service edge (SASE) becomes the must-have cyber service

Posted on January 21, 2021

SASE was originally discussed as a potential, slightly theoretical solution to bridge the evolving patterns of network utilization and delivery, together with the need for more broadly distributed security, delivered as a cloud-like service. However, over the past 12 months, the concept has gained significant momentum in the market. Many ...

read more

The next big things in cyber security

Posted on January 19, 2021

Cyber security is one of the most dynamic topics in the IT industry. New threats and technologies come onto the scene very frequently, leaving security managers one step behind. It is not easy to separate the wheat from the chaff - to distinguish between the next buzz word and the next really important topic that should be evaluated for ...

read more

PAC Predictions 2021: Automatisierte SOCs sind im Kommen, da Cyber-Security-Kapazitäten ins Blickfeld der Vorstände rücken

Posted on January 12, 2021

Die Automatisierung dringt in alle Bereiche des modernen Unternehmens vor. Daher ist es wenig überraschend, dass wir immer mehr Beispiele für den Einsatz dieser Technologie im Bereich Cybersicherheit sehen. Security Operations Center (SOCs) sind ein Schlüsselelement der Cybersicherheit in Unternehmen. Sie erfüllen eine wesentliche Funktion ...

read more

PAC Predictions 2021: Automated SOCs – as cyber security capabilities become the main source of C-Suite focus, expect to see automated SOCs

Posted on January 12, 2021

With automation touching on every aspect of the modern enterprise, it is no surprise to see more examples of the technology applied in a cyber security context. Security operations centers (SOCs) are key assets for enterprise cyber security, playing a vital role as the cyber security control tower...

read more

Impressions from AWS re:Invent 2020 - Part 1: “the right tool for the right job“

Posted on December 21, 2020

Many things were different this year at AWS’ global customer event. It was extended from one to three weeks, with five key notes and more than 500 technical sessions. And instead of hosting 65,000 attendees onsite in Las Vegas as last year, AWS welcomed over 500,000 registered attendees at their virtual event.

But many things also felt ...

read more

Threat detection and prevention – a must-have

Posted on November 26, 2020

The costs associated with security breaches amount to billions, or even trillions of euro every year, and the figures keep rising due to the proliferation of digital technologies and channels, which create more and more backdoors and vulnerabilities for cyber criminals. As cyber threats are constantly and rapidly expanding their reach, all ...

read more

The challenge to protect industrial systems

Posted on March 10, 2020

Operational technology (OT) and information technology (IT) used to be separate for decades as there was simply no reason to integrate these two areas. Stable OT systems were basically left untouched during the lifetime of a production plant, while IT has always had a reputation for needing frequent changes and being vulnerable to cyber ...

read more

Key issues in cyber security for smart cities

Posted on February 28, 2020

Smart cities are still a pretty new approach for cities and their inhabitants and visitors and even the used technologies are cutting edge.

read more

CxO 2019 – Investment Priorities – Cyber Security

Posted on February 27, 2020

Over the last years, digital transformation has made the difficult transition from an over-used topic of vendor hype to a concrete user reality. Every business leader – whether involved in IT or not – now understands that business disruption as a result of digital technologies can fundamentally upset established business ecosystems. This ...

read more

The top 10 IT trends for 2020 (10) – Trend 9: Managed security services accompany digital change

Posted on February 3, 2020

Today we are faced with a dynamically changing threat situation that has many causes. On the one hand, there is an astonishing rise in cyber attacks that are increasingly innovative, agile, global, and targeted. On the other hand, digital transformation technologies such as the cloud, mobility, IoT, IT/OT integration, and software-defined ...

read more

Die Top 10 IT-Trends für 2020 (10) – Trend 9: Managed Security Services begleiten den digitalen Wandel

Posted on February 3, 2020

Wir sehen uns heute mit einer sich dynamisch verändernden Bedrohungslage konfrontiert, die viele Ursachen hat. Einerseits nimmt die Zahl der Cyberangriffe erstaunlich stark zu, die immer innovativer, agiler, globaler und gezielter werden. Allerdings steht den Unternehmen auch ein wachsendes Arsenal an Tools zur Verfügung, die ...

read more

Cyber-sécurité : la France dans le peloton de tête d’un marché atypique

Posted on October 17, 2019

La France est devenue l’un des pays plus avancés au niveau mondial en cyber-sécurité. D’une part, parce que le numérique est au cœur de la chaîne de valeur de la plupart des entreprises et administrations et que les principaux atouts du modèle numérique – ouverture, rapidité, capacité de changement – sont autant de facteurs susceptibles de ...

read more

The changing role of the CISO

Posted on October 16, 2019

In 2018, teknowlogy interviewed 250 IT security decision-makers (CISOs, directors and heads of IT security, and others) on the future role of the CISO. Those interviews were based on a CATI (computer-assisted telephone interview) approach, with professionals from the Americas, EMEA & APAC. In addition to the quantitative study, 11 ...

read more

Usage of artificial intelligence in cyber security

Posted on October 2, 2019

Artificial intelligence (AI) is currently one of the most hyped topics, and this is also the case in cyber security. There are a series of use cases were AI can be used to reduce manual work by humans and increase the level of security due to the ability to monitor 100% of traffic or 100% of actions taken by users – a task that human cyber ...

read more

Customer identity and access management (CIAM): a new killer app

Posted on September 16, 2019

Many innovations need "out-of-the-box" thinking; CIAM is a perfect example – from a simple cyber security tool, i.e. single sign-on (SSO), CIAM platforms have emerged, which efficiently and securely provide web CRM and a single customer view.

read more

DevSecOps, the new normal

Posted on July 9, 2019

The rise of DevOps is the latest evolution of the goal of IT/business alignment, an evolution that is well adapted to the digital needs of businesses and the developments in cloud computing architecture. However, it generates specific cyber security issues. That's where DevSecOps comes into play.

read more

The future is platform-based – insights from the IBM Security Summit 2019

Posted on June 14, 2019

On June 5th, 2019, a radiant summer day in Berlin, teknowlogy visited this year's IBM Security Summit at "Bikini Berlin" – an event taking place as part of the "Think at IBM" event series and providing a whole range of information and insights for the avid security expert. The focus was primarily on IBM's view of the security market and its ...

read more

Synergy 2019: Citrix setzt beim Unified Workspace auf Produktivität, Multi-Cloud und Sicherheit - Teil 2

Posted on May 28, 2019

Lesen Sie im zweiten Teil unseres Beitrags zur Synergy 2019 über Citrix Analytics for Performance, über Citrix' Offenheit für Anwendungen von Cloud-Plattformen sowie unser Fazit zur Synergy 2019.

read more

Pages