KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence.
Identity and Access Management (IAM) is no longer a one-off project—it’s an ongoing journey. In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Christopher (CISO & Lead Advisor) and Deniz Algin (Advisor) to explore how organizations can successfully apply the Identity Fabric concept. How to evolve from legacy systems to a future-proof IAM strategy without breaking existing operations? Why interoperability matters? What are the most common pitfalls organizations face when trying to modernize IAM? Find the answer to these questions and more in this episode! Key Topics Covered: Identity Fabric explained through a powerful “airport” analogy ✈️ How to design IAM programs in brownfield environments (no rip & replace) Capability-driven approach vs. tool-driven decisions Risk-based prioritization: quick wins, big wins & roadmaps Common pitfalls to avoid when modernizing IAM
DDoS attacks are evolving and becoming more dangerous than ever. In this video, Osman Celik speaks with Andrey Leskin from QRator Labs about the current DDoS attack landscape and how organizations can defend themselves. You’ll learn: What DDoS attacks are and how they work across layers 3, 4, and 7 Why Layer 7 (application-layer) attacks are the fastest-growing and hardest to detect How attackers are building massive botnets (millions of compromised devices) Real-world DDoS incidents hitting FinTech, e-commerce, and media sectors The differences between scrubbing capacity and PoP proximity in mitigation How QRator Labs approaches DDoS protection with scrubbing, anti-bot, and WAF solutions With Layer 7 attacks rising by 74% year-over-year and record-breaking volumetric attacks now lasting weeks, no industry can afford to ignore this threat. Watch now to understand how to protect your business from DDoS, botnets, and evolving cyber threats.
In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger and special guest Felix Gaehtgens to explore two of the hottest (and most debated) topics in identity today: Identity Threat Detection & Response (ITDR) and Non-Human / Machine Identities (NHI). Together, they gothrough the buzzwords to reveal what’s real, what’s hype, and how organizations should approach these fast-evolving areas of IAM. From visibility vs. observability, to governance challenges and the future of machine identity management, this episode delivers sharp insights and practical recommendations from three IAM veterans. So tell us — are ITDR and NHI just marketing buzzwords, or essential must-haves for modern identity security? Key topics covered: ITDR explained: buzzword or meaningful evolution in IAM? Why visibility and observability are not the same The missing “R” in detection & response IAM vs. SOC responsibilities for ITDR Machine identities: terminology, challenges, and governance Ephemeral vs. static machine identities How IAM teams can prepare for the future of identity security
In this episode of the KuppingerCole Analyst Chat, Matthias is joined by Charlene Spasic and Kai Boschert to break down what real IAM maturity means. They explain why structured frameworks like the KuppingerCole Identity Fabric and Reference Architecture are critical, and how organizations can move beyond tools to focus on capabilities, governance, and business alignment. So tell us, is your IAM program truly mature—or just a checklist of tools? Key Topics Covered: Why IAM maturity starts with capabilities, not tools How to assess your current IAM status quo The role of identity lifecycle management & governance Common IAM challenges and gaps organizations face Why step-by-step progress beats “big bang” projects
The fraud landscape has been rocked by a seismic shift—obsolete security systems no longer stand a chance. Enter FRIPs, the revolutionary platforms transforming identity verification and transaction security. As fraudsters evolve, only enterprises leveraging these advanced defenses will thrive. Can your business afford to lag behind in this high-stakes IT arms race? Read the original blog post here: https://www.kuppingercole.com/events/ifid2025/blog/how-frip-weaponizes-identity-fabrics-the-security-revolution-hiding-in-plain-sight
In this practical episode of the KuppingerCole Analyst Chat, Patrick Teichmann joins Matthias Reinwarth to address a surprisingly common organizational issue: IAM teams being tasked with solving everything. From HR data gaps to legacy tool cleanup and cross-department handovers — IAM teams often inherit work that isn’t truly their responsibility. This episode is a call to realign IAM strategy with clear ownership, realistic boundaries, and strong service delivery. In this conversation: Why not everything is an IAM problem Common traps: onboarding issues, ownership gaps, tool clutter How to set boundaries without damaging collaboration Using operating models and RACI matrices to define IAM’s real scope Why focusing your IAM team improves service quality and security How to justify saying “no” — with strategy to back it up Preparing for IAM scalability, sustainability, and new regulations Key takeaway: Sharpening your focus as an IAM team isn't about doing less — it’s about doing what matters most, better.
In this episode of the KuppingerCole Analyst Chat, Martin Kuppinger joins Matthias Reinwarth to dive deep into one of the most overlooked but critical areas in identity and security: non-human identities (NHI) and workload secrets. As cloud-native development and AI-driven workloads grow, so does the complexity of managing machine identities. With AWS now supporting long-lived API keys for generative AI, this episode explores why that's a risky move — and what a modern, secure, and developer-friendly alternative looks like. In this episode, you'll learn: Why workload identities must be treated as privileged How long-lived secrets expand your attack surface Why “balancing convenience vs. security” is a false choice How to apply ephemeral secrets and ITDR signals The role of SPIFFE/SPIRE, policy-as-code (OPA), and automation Why developers shouldn’t own security — and what IAM must do instead How attackers use AI to hunt your leaked secrets What organizations must do to secure NHI at scale Key takeaway: Security must be built around short-lived secrets, automation, and clear separation between identity, secrets, and entitlements — especially for workloads and AI agents.
In this episode of the KuppingerCole Analyst Chat, Warwick Ashford joins Matthias Reinwarth to explore a hidden but growing risk: third-party access to your systems. Third-party contractors, suppliers, and partners often have access to internal systems — but lack the same governance, oversight, and security controls as employees. This episode explores why Third-Party Access Governance (TPAG) is now a strategic security priority, not just a technical integration. What we cover:✅Why third-party identities now outnumber employees in many orgs✅The governance gap: no HR triggers, lifecycle oversight, or certifications✅How traditional IAM systems fail to manage external access✅The role of the Identity & Security Fabric in enabling TPAG✅Regulatory drivers (DORA, NIS2, CMMC) making this a board-level issue✅Core capabilities of modern TPAG solutions✅Practical first steps for building a third-party access governance strategy
Explore how the Oracle Database@AWS collaboration eliminates multi-cloud compromises, integrating Oracle's capabilities within AWS to enhance security, performance, and compliance. Learn how this partnership enables businesses to lift and shift existing workloads easily, leverage AI automation, and achieve rapid data integration, all while maintaining enterprise-grade security and scalability. Read the original blog post here: https://www.kuppingercole.com/blog/balaganski/oracle-databaseaws-combining-the-best-of-both-clouds
In a groundbreaking move, Palo Alto targets a $25 billion acquisition of CyberArk, poised to reshape identity security landscapes. As two cybersecurity giants converge, explore this narrative of strategic synergy versus the challenge of seamless integration. With potential market upheaval at stake, the acquisition promises to redefine the rules of identity security. Read the original blog post here: https://www.kuppingercole.com/blog/leal/palo-alto-cyberark-a-strategic-expansion-into-identity-security-but-with-questions
In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, to discuss the evolution of the Identity Fabric. Originally introduced as a visual tool in 2017–2018, the Identity Fabric has matured into a foundational framework for modern identity and access management. The conversation covers the motivations behind its creation, its flexibility in addressing various identity types, and its role in simplifying complex IAM architectures. Martin also explains the rationale for a leaner version of the model, aimed at executive stakeholders, and offers a glimpse into the forward-looking Identity Fabric for the 2040s. In this episode, you’ll learn:✅Where the Identity Fabric concept began✅Why a leaner version is needed — and who it’s for✅How to pitch Identity Fabric to C-level decision makers✅What the 2040s might look like for IAM✅How organizations and vendors alike are using this model today Whether you're deep in IAM or just starting to align your strategy, this episode breaks down how to communicate complex identity concepts more clearly.
In this episode, Matthias Reinwarth is joined by Alejandro Leal, Senior Analyst at KuppingerCole Analysts, to discuss the strategic shift toward Identity Fabrics in modern IAM. Alejandro outlines the challenges posed by fragmented IAM architectures and the growing diversity of digital identities. The conversation explores how the Identity Fabric model enables organizations to build cohesive, adaptive identity infrastructures that integrate existing tools while providing observability and actionable insights. They also examine the importance of integration, modularity, and policy enforcement across identity silos. The episode concludes with practical steps for building a future-proof IAM strategy. We dive into: Why traditional IAM is failing What Identity Fabric really means (and what it’s not) How it supports every identity type — human or machine The critical role of observability & actionable insights How to balance legacy tools with agile innovation Where to start your implementation — without a big bang Identity is now a strategic business function — and Identity Fabric is how to operationalize it.
In this must-listen episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Jonathan Care to explore a groundbreaking shift in cybersecurity leadership. Discover how CISOs are transforming from traditional gatekeepers, the infamous "Dr. No", into strategic business enablers through the principles of Servant Leadership. We dive deep into: Why the CISO role is evolving beyond technology and policy The pitfalls of autocratic security leadership and rising burnout How empowering teams builds trust, reduces shadow IT, and accelerates projects Real-world examples from global organizations proving this approach works Practical first steps for CISOs to start leading through influence, not fear Key Takeaway: Security isn’t just about tech, it’s about people and culture. Servant leadership helps build stronger security and stronger businesses.
As non-human identities outpace their human counterparts, the need for effective Non-Human Identity (NHI) management is more crucial than ever. Discover why current systems may leave your organization exposed and how a unified governance approach can safeguard against the risks posed by cloud-native development and Agentic AI. Read original blog post here: https://www.kuppingercole.com/events/ifid2025/blog/non-human-identity-management-mature-or-just-getting-started
In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth sits down with cybersecurity CTO & analyst Alexei Balaganski to explore the dramatic evolution of API management and security. They unpack: Why APIs are now the backbone of AI agents and how MCP (Model Context Protocol) is driving a new decentralized ecosystem. The explosion of shadow APIs & hidden interfaces from your printer to your coffee machine and why they pose serious risks. How edge computing & WebAssembly are decentralizing everything, making old API gateway models obsolete. The critical need for API posture management, identity & access controls for non-human identities, and full lifecycle security even before you write a line of code. Learn why API security isn’t just a tech problem, it’s the next big business risk, how the market is consolidating, and what’s coming in the new Leadership Compass on API Management & Security.
In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger to untangle one of the most complex—and increasingly urgent—topics in digital identity: non-human identities (NHIs). With AI agents, workloads, service accounts, and API keys exploding in number, it’s no longer enough to rely on traditional IAM structures. But what is an NHI, exactly? And how can organizations secure them without collapsing under the weight of siloed systems and unmanaged identities? Martin and Matthias explore: The blurry boundaries between identities, accounts, secrets, and credentials Why "non-human" is a problematic but useful term Agentic AI vs. API keys: where identity management really changes Practical starting points for managing NHIs in real-world environments
In this essential episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes cybersecurity strategist Jonathan Care to explore one of the most pressing challenges CISOs face in 2025: detecting deception in an age of AI-powered attacks. From deepfakes and behavioral manipulation to vendor impersonation and adversarial AI, attackers are no longer relying on simple phishing emails. They're launching highly personalized, deeply technical, and psychologically crafted deceptions. Jonathan presents a structured four-part taxonomy of deception and offers actionable insights for CISOs—from implementing callback verification protocols to deploying behavioral analytics and deception detection technologies. Topics Covered: AI-powered social engineering Digital identity deception & deepfakes Vendor/supply chain impersonation Technical deception & adversarial machine learning Practical steps CISOs can take this week
Discover how Europe plans to reduce its dependency on imported digital technologies through the EuroStack initiative. Learn about strategic proposals for building a resilient, sovereign digital Europe, and uncover the vital roles collaboration and innovation play in achieving long-term economic, social, and environmental resilience in the digital landscape. Read the original blog post here: https://www.kuppingercole.com/blog/leal/notes-from-cybersec-2025-the-eurostack-vision
Organizational identity is no longer optional In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by cybersecurity research director John Tolbert to talk about the rising threats of organizational fraud, rogue merchants, and the growing need for robust identity verification at the business level. Topics covered: What are rogue merchants, and how do they operate? The staggering fraud numbers behind the Paycheck Protection Program (PPP) The importance of Know Your Business (KYB) vs. Know Your Customer (KYC) Why legacy business verification methods are no longer enough How APIs, LEIs, and verifiable digital identities can help The role of CIEM and B2B CIAM in detecting and preventing organizational fraud Whether you're in cybersecurity, compliance, finance, or e-commerce, this episode unpacks how fraud at the organizational level is growing—and what tools and frameworks can stop it.
Unlock vital strategies on how to defend your organization from costly supply chain attacks by ensuring airtight third-party access management, understanding the latest regulatory demands, and implementing cutting-edge IAM solutions that go beyond perimeter defenses. Read the original blog post here: https://www.kuppingercole.com/blog/ashford/third-party-risk-is-the-new-front-door
In this episode, Matthias Reinwarth welcomes KuppingerCole Membership Product Owner Christie Pugh to share her unique perspective on the European Identity and Cloud Conference (EIC) 2025.
Beware the digital impostors! Deepfakes aren't just sci-fi anymore; they're here, and they're a threat to your bank account, your vote, and your trust. Peek behind the curtain of this digital deceit, where emerging technologies fight to expose forgeries and keep our truth intact. Discover the urgent strategies needed to outpace this digital battleground. Read the original blog post here: https://www.kuppingercole.com/blog/celik/what-to-expect-from-deepfake-threats-and-how-likely-are-we-to-develop-effective-detection-tools
Unveiling its European Digital Commitments, Microsoft moves to empower Europe's digital sovereignty! But is it enough to break free from US influence? Explore the balance between innovative data strategies, European partnerships, and the struggle against extraterritorial laws that challenge cloud independence. A riveting journey into the future of cloud sovereignty awaits. Read the original blog post here: https://www.kuppingercole.com/blog/small/microsofts-cloud-sovereignty-promises-progress-or-patchwork
In this episode, Matthias Reinwarth welcomes KuppingerCole Lead Advisor Patrick Teichmann to share his highlights from attending the European Identity and Cloud Conference (EIC) for the first time.
What were the key takeaways from EIC 2025? This week, Matthias Reinwarth speaks with Dr. Phillip Messerschmidt, IAM expert and advisor at KuppingerCole Analysts, to get a personal review of the European Identity and Cloud Conference 2025 and its highlights.
Get ready for EIC 2025!
One does not simply secure an enterprise without integration. In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth sits down with cybersecurity expert Jonathan Care to explore the Cybersecurity Fabric — an emerging architectural concept designed to unify existing security tools, improve visibility, and enable automation and orchestration across your entire IT environment. Discover how this approach complements frameworks like Zero Trust and NIST, what benefits it brings to your organization, and how it can evolve alongside your security maturity.
Apple's defiance against the UK's call for a secretive surveillance backdoor marks a pivotal moment in digital privacy battles. With an open tribunal ruling, the clash between encryption integrity and governmental power unfolds publicly. Plunge into this landmark case influencing global tech policies, setting the stage for enhanced corporate resilience strategies. Read the original blog post here: https://www.kuppingercole.com/blog/care/uk-pushes-for-apple-backdoor
Dive into the complexities of US isolationism and uncover what it means for global cloud sovereignty. Gain insights on data privacy, operational challenges, and how these affect international businesses using US-based cloud services. Read the original blog post here: https://www.kuppingercole.com/blog/small/sovereign-cloud-geopolitical-risks
In this eye-opening episode of the KuppingerCole Analyst Chat, Dr. Kashyap Thimmaraju, postdoc researcher at TU Berlin and founder of FlowGuard Institute, joins Matthias Reinwarth to discuss his groundbreaking research into burnout, well-being, and flow state in Security Operations Centers (SOCs).
Join Matthias Reinwarth in this special episode of the KuppingerCole Analyst Chat as he welcomes not one but two expert guests: Nitish Deshpande, Research Analyst at KuppingerCole, and Martin Kuppinger, Principal Analyst and Co-Founder of KuppingerCole. Together, they explore the evolution of modern authorization, discussing how far the industry has come since the early days of static entitlements and XML-based policies. From early insights shared back in 2009 to today’s dynamic, AI-enhanced, signal-driven authorization models, this episode unpacks the what, why, and how of modern access control systems.
In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.
In a blockbuster $32 billion deal, Google aims to redefine cloud security with the acquisition of Wiz, propelling the industry into uncharted territory. As the allure of integrated security solutions promises to bridge fragmented environments, the spotlight is on Google's next moves in the battle against cyber threats. Dive into what's next for cloud security! Read the original blog post here: https://www.kuppingercole.com/blog/small/google-acquires-wiz
Step into the realm of modern identity management with federated identities but beware of potential pitfalls. Organizations are welcoming external partners into cloud environments, challenging traditional IAM frameworks. Unravel how your company can embrace this evolution while maintaining security, compliance, and efficiency. Read on to navigate these uncharted waters with confidence and strategic foresight. Read the original blog post here: https://www.kuppingercole.com/events/eic2025/blog/federation-without-frustration-setting-the-right-framework-for-external-identities
In the era of cloud-driven business, non-human identities are more pervasive than ever. They offer immense utility but also risky vulnerabilities. Discover how ITDR solutions are turning the tide in identity threat detection, ensuring that your organization's automated processes remain seamless and secure. The future of identity security starts here. Read the original blog post here: https://www.kuppingercole.com/events/eic2025/blog/rage-against-the-machines-itdr-and-the-rise-of-non-human-identities
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes back Alexei Balaganski, Lead Analyst at KuppingerCole Analysts, to continue their deep dive into quantum computing and its impact on authentication security. They discuss the increasing risks posed by quantum threats, the vulnerabilities of current encryption standards, and the critical role of crypto agility in ensuring long-term security. The conversation explores how organizations can prepare for the post-quantum era, highlighting strategies such as hybrid cryptography, quantum-resistant algorithms, and zero-trust authentication models. Alexei shares insights into the latest advancements in quantum-safe security, regulatory considerations, and practical steps businesses can take to mitigate future risks. The episode wraps up with a look at emerging trends in quantum security and what the future holds for authentication in a rapidly evolving digital landscape.
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, to explore the intersection of Non-Human Identities (NHI) and Identity Threat Detection and Response (ITDR). They discuss the growing importance of securing machine identities, service accounts, APIs, and automation processes, as well as the security risks associated with overprivileged accounts and mismanaged credentials. The conversation highlights how ITDR enhances traditional IAM and PAM solutions by providing real-time monitoring, anomaly detection, and automated threat response. Martin shares insights into AI-driven threat detection, zero-trust principles, and best practices for organizations looking to mitigate identity-based threats. The episode concludes with a look at emerging trends in ITDR and the future of machine identity security.
In an era where privacy is overshadowed by convenience and AI's immense capabilities, critical misconceptions and stark realities loom large. Are companies and individuals ready to protect what little privacy remains, or is it a lost cause in today's digital age? Discover the provocative debates shaping the future of privacy. Read the original blog post here: https://www.kuppingercole.com/blog/balaganski/privacy-and-data-protection-do-they-still-belong-together
The digital security apocalypse is looming, courtesy of quantum computing. Is your organization ready? As passwords cling to life, quantum computers threaten to dismantle existing encryption, rendering current authentication insufficient. Dive in to explore the dawn of post-quantum cryptography and the critical need for crypto-agility to safeguard your digital domain effectively. Read the original blog post here: https://www.kuppingercole.com/events/eic2025/blog/strong-authentication-in-a-post-quantum-world
Step into the future of travel where digital identity technologies are reshaping cross-border experiences. Explore the rise of innovations like automated verification, while uncovering regional success stories like SITA and India's Digi Yatra. Discover how international collaboration could make cumbersome passport checks a thing of the past. Welcome to the next era of seamless and secure global journeys. Read the original blog post here: https://www.kuppingercole.com/events/eic2025/blog/the-future-of-digital-travel-credentials-trust-adoption-and-the-eidas-20-framework
In today's interview, Mirela Ciobanu, Lead Editor at The Paypers, talks with John Erik Setsaas, Director of Innovation at Tietoevry Banking, about the challenges and opportunities in digital identity and fraud prevention at cyberevolution 2024.
In this exclusive interview, Mirela Ciobanu, Lead Editor at The Paypers, sits down with Justin Richer, CTO of UberEther, to explore the latest advancements and challenges in digital identity at cyberevolution 2024.
Stay updated on the future of CIAM: Learn about integrating privacy management, fraud intelligence platforms, and CDPs to enhance security and customer experience. Read the original blog post here: https://www.kuppingercole.com/blog/tolbert/whats-next-in-customer-identity-and-access-management
In this exclusive interview, Mirela Ciobanu, Lead Editor at The Paypers, sits down with Max Imbiel, CISO of BitPanda, to discuss the evolving challenges and opportunities in cybersecurity within the crypto space.
Explore the challenges of EU DORA compliance and why supply chain cybersecurity remains a critical concern. Uncover hidden risks and strategies for building resilience in financial services. Read the original blog post here: https://www.kuppingercole.com/blog/fisher/eu-dora-compliance-day-arrives-but-supply-chain-cybersecurity-remains-a-major-concern
In today's interview, Mirela Ciobanu, Lead Editor at The Paypers, talks with Sergej Epp, CISO at Sysdig, about the ever-evolving world of cybersecurity and its impact on industries worldwide.
Discover how to rethink Identity Governance and Administration (IGA) to meet the demands of a dynamic workforce, rapid application turnover, and evolving compliance needs. Learn key strategies for modernizing IGA with agility, automation, and policy-driven solutions. Read the original blog post here: https://www.kuppingercole.com/blog/kuppinger/rethinking-identity-governance-and-administration-iga-in-the-digital-era