KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence
In this episode, Matthias Reinwarth welcomes KuppingerCole Lead Advisor Patrick Teichmann to share his highlights from attending the European Identity and Cloud Conference (EIC) for the first time.
What were the key takeaways from EIC 2025? This week, Matthias Reinwarth speaks with Dr. Phillip Messerschmidt, IAM expert and advisor at KuppingerCole Analysts, to get a personal review of the European Identity and Cloud Conference 2025 and its highlights.
Get ready for EIC 2025!
One does not simply secure an enterprise without integration. In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth sits down with cybersecurity expert Jonathan Care to explore the Cybersecurity Fabric — an emerging architectural concept designed to unify existing security tools, improve visibility, and enable automation and orchestration across your entire IT environment. Discover how this approach complements frameworks like Zero Trust and NIST, what benefits it brings to your organization, and how it can evolve alongside your security maturity.
In this eye-opening episode of the KuppingerCole Analyst Chat, Dr. Kashyap Thimmaraju, postdoc researcher at TU Berlin and founder of FlowGuard Institute, joins Matthias Reinwarth to discuss his groundbreaking research into burnout, well-being, and flow state in Security Operations Centers (SOCs).
Join Matthias Reinwarth in this special episode of the KuppingerCole Analyst Chat as he welcomes not one but two expert guests: Nitish Deshpande, Research Analyst at KuppingerCole, and Martin Kuppinger, Principal Analyst and Co-Founder of KuppingerCole. Together, they explore the evolution of modern authorization, discussing how far the industry has come since the early days of static entitlements and XML-based policies. From early insights shared back in 2009 to today’s dynamic, AI-enhanced, signal-driven authorization models, this episode unpacks the what, why, and how of modern access control systems.
In this videocast, KuppingerCole Analysts' Senior Analyst Warwick Ashford is joined by Prakash Sinha, Senior Director and Technology Evangelist at Radware, to explore how security teams can drive Mean Time To Resolution (MTTR) close to zero. As AI-powered attacks increase in sophistication and frequency, security operations centers (SOCs) must evolve by leveraging automation and AI-driven incident response. Prakash shares insights on how AI can enhance threat detection, automate remediation, and reduce analyst workloads while maintaining governance and accountability. Discover practical steps for implementing AI-assisted security and the key success factors for modernizing SOCs in the face of an ever-changing threat landscape.
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth welcomes back Alexei Balaganski, Lead Analyst at KuppingerCole Analysts, to continue their deep dive into quantum computing and its impact on authentication security. They discuss the increasing risks posed by quantum threats, the vulnerabilities of current encryption standards, and the critical role of crypto agility in ensuring long-term security. The conversation explores how organizations can prepare for the post-quantum era, highlighting strategies such as hybrid cryptography, quantum-resistant algorithms, and zero-trust authentication models. Alexei shares insights into the latest advancements in quantum-safe security, regulatory considerations, and practical steps businesses can take to mitigate future risks. The episode wraps up with a look at emerging trends in quantum security and what the future holds for authentication in a rapidly evolving digital landscape.
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, to explore the intersection of Non-Human Identities (NHI) and Identity Threat Detection and Response (ITDR). They discuss the growing importance of securing machine identities, service accounts, APIs, and automation processes, as well as the security risks associated with overprivileged accounts and mismanaged credentials. The conversation highlights how ITDR enhances traditional IAM and PAM solutions by providing real-time monitoring, anomaly detection, and automated threat response. Martin shares insights into AI-driven threat detection, zero-trust principles, and best practices for organizations looking to mitigate identity-based threats. The episode concludes with a look at emerging trends in ITDR and the future of machine identity security.
In today's interview, Mirela Ciobanu, Lead Editor at The Paypers, talks with John Erik Setsaas, Director of Innovation at Tietoevry Banking, about the challenges and opportunities in digital identity and fraud prevention at cyberevolution 2024.
In this exclusive interview, Mirela Ciobanu, Lead Editor at The Paypers, sits down with Justin Richer, CTO of UberEther, to explore the latest advancements and challenges in digital identity at cyberevolution 2024.
In this exclusive interview, Mirela Ciobanu, Lead Editor at The Paypers, sits down with Max Imbiel, CISO of BitPanda, to discuss the evolving challenges and opportunities in cybersecurity within the crypto space.
In today's interview, Mirela Ciobanu, Lead Editor at The Paypers, talks with Sergej Epp, CISO at Sysdig, about the ever-evolving world of cybersecurity and its impact on industries worldwide.
In this exclusive interview, Mirela Ciobanu, Lead Editor at The Paypers, sits down with Andrzej Kawalec, Head of Cybersecurity for Vodafone Business, to explore the evolving landscape of cybersecurity and its critical role in driving innovation.
As we close another year, join us in reflecting on KuppingerCole’s journey from a niche identity management focus to becoming a leader in the intersection of identity and cybersecurity. Discover exciting new initiatives like our Rising Stars Program and explore the challenges and opportunities shaping the future of the industry. Watch now and hear how we’re empowering the community with insights, innovation, and tools to thrive in a rapidly evolving digital landscape. Wishing you a safe and secure holiday season and a successful 2025!
Join us as we explore the major cybersecurity and IAM trends to keep an eye on in 2025. We’ll discuss the emergence of non-human identities, the hurdles of quantum-safe encryption, and the practical applications of AI and decentralized identity. Get ready to learn how these trends will influence the industry and how you can stay ahead of the curve.
We sit today with André from Unit 42 as he covers the rapidly changing landscape of cyber threats and points out some key trends in 2025, from increasing sophistication in cyberattacks to state actors gaining a greater upper hand. He provides insight into how organizations can prepare and defend against emerging risks. In this session, learn about the latest challenges and strategies for building cyber resilience in an increasingly complex global environment.
In this videocast, Tom Bruggeman from DPG Media shares how his team tackled the challenges of user authentication in a fast-changing media landscape. He highlights the role of open standards like OAuth and OIDC and explains how Authlete helped create a seamless and secure user experience. Tom also offers insights into future plans, including efforts to enhance user privacy and explore data wallet solutions.
In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by cybersecurity expert John Tolbert to talk about essential tips for personal cyber hygiene. Together, they discuss practical advice for keeping your devices secure, avoiding common threats, and implementing best practices for online safety. Whether you're a tech-savvy professional or just starting to think about your digital security, this episode offers actionable insights to protect yourself and your loved ones in an increasingly connected world.
Matthias Reinwarth and Dr. Phillip Messerschmidt delve into the complexities of Cyber Supply Chain Risk Management (C-SCRM). They discuss the importance of understanding and mitigating risks that arise from external suppliers and the interconnected nature of modern supply chains. The conversation highlights the critical role of Identity and Access Management (IAM) in managing these risks, particularly in the context of federated identities and the challenges that arise from relying on third-party controls. The speakers emphasize the need for organizations to actively assess and manage risks, implement robust onboarding processes, and continuously improve their cybersecurity practices to protect against potential threats.
This Videocast episode explores the complexities and advancements in digital identity standards, focusing on FAPI, OAuth, and OpenID Connect. Martin Kuppinger and Joseph Heenan, CTO of Authlete, discuss the origins and purpose of FAPI, its adoption across various regions, and its significance in enhancing security and interoperability in financial services. They also highlight the role of Authlete in simplifying the implementation of these standards for developers and the emerging trends in decentralized identity and verifiable credentials.
Join Matthias Reinwarth and Alexei Balaganski as they dive into the changing world of cybersecurity. In this episode, they talk about Cyber Threat Intelligence (CTI) and Attack Surface Management (ASM), exploring how security is moving from old-school models to more proactive, real-time threat detection. They also discuss how AI is shaking things up in cybersecurity and why understanding the dark web is more important than ever. The takeaway? Organizations need to tap into expert CTI and ASM services to stay ahead of today’s complex cyber threats.
Matthias and Christopher discuss the critical importance of cyber hygiene in the corporate context, especially in light of evolving threats such as AI-driven attacks, deepfakes, and ransomware. They emphasize the need for organizations to train employees on recognizing and responding to these threats, as well as the role of technology in both perpetrating and preventing cybercrime. The discussion also touches on the growing issue of disinformation and the necessity for vigilance in verifying information.
In this episode, host Matthias welcomes Research Analyst Alejandro Leal to explore the evolving landscape of cyber warfare. Drawing from William Gibson's sci-fi classic "Neuromancer," they discuss how the digital battleground is now a critical arena for nations, corporations, and cyber criminals. Their conversation covers the economic consequences of cyber attacks, the strategic importance of undersea fiber optic cables, and the role of semiconductor manufacturing in global tensions. Learn how different national perspectives on cyberspace shape security measures and why international cooperation is essential in addressing challenges like AI governance and climate change. Join Matthias and Alejandro as they dissect the current state of cyber warfare and its implications for global security. Don't forget to leave your comments and questions below! Alejandro's Blog: https://www.kuppingercole.com/events/cyberevolution2024/blog/us-china-struggle-for-cyberspace
In this episode, Matthias and Alexei explore the urgent need for organizations to prepare for the coming age of quantum computing and the potential risks it poses to current cryptographic standards. As quantum technology advances, traditional encryption methods may become vulnerable, putting critical data, transactions, and security at risk. Alexei discusses the concept of crypto agility—the ability to quickly adapt cryptographic infrastructure in response to new threats. He shares practical advice on how to assess and update legacy systems, encryption methods, and workflows, including: Where organizations should begin if they rely heavily on cryptography for critical data and transactions How to evaluate and improve cryptographic infrastructure across digital systems, cloud environments, and hardware The essential role of vendor collaboration and supply chain security in building quantum-safe systems How to prioritize threats like ransomware and crypto-related risks based on industry needs Alexei also underscores the importance of workforce training, advising that while employees don’t need deep cryptography knowledge, they must understand secure practices and tools approved by their organization’s security policy.
Burnout, fatigue, depression: This episode is all about the mental health challenges faced by cybersecurity professionals, highlighting the increasing pressures and responsibilities in the field. Matthias invited experts Sarb Sembhi and Dr. Kashyap Thimmaraju to discuss the impact of these challenges on individuals and organizations, emphasizing the need for better support systems, transparency, and proactive strategies to promote mental well-being in the cybersecurity industry. Mental Health in Cybersecurity Foundation: https://www.virtuallyinformed.com/mhincs LinkedIn Group: https://www.linkedin.com/groups/12989900/ The Mental Health in Cybersecurity Charter: https://www.virtuallyinformed.com/mhincs-foundation-charter Contact the Mental Health in Cybersecurity Foundation Research: research@mhincs-foundation.org Community of Practice: cop@mhincs-foundation.org
In this conversation, Matthias and Martin explore the concept of machine identities, discussing their significance in modern IT infrastructures. They discuss the challenges of managing these identities, the importance of lifecycle management, and the impact of regulations on cybersecurity. The conversation emphasizes the need for organizations to understand and properly manage machine identities to ensure security and compliance in an increasingly complex digital landscape.
Matthias and Alejandro discuss the concept of Zero Trust, emphasizing its importance in modern cybersecurity. They explore the core principles of Zero Trust, including continuous monitoring, data protection, and the common misconceptions surrounding it. The discussion highlights the significance of automation and orchestration in enhancing security measures and provides real-world examples of successful Zero Trust implementations. The conversation concludes with insights into future trends and the evolving nature of cybersecurity threats.
Matthias discusses the new KuppingerCole Membership program with Vanessa Schweihofer and Alexei Balaganski. They explore the various benefits of the Membership, including access to research, networking opportunities, and personalized insights through inquiry calls and workshops. The conversation highlights the technological advancements being integrated into the Membership, such as AI capabilities and a passwordless registration process. The importance of community building and continuous improvement in cybersecurity and identity management is emphasized, along with the advantages of Corporate Membership for teams.
Matthias invited KuppingerCole CEO Berthold Kerl and CISO Christopher Schütze to discuss the relationship between the CEO and the CISO in integrating cybersecurity into the company's business strategy. They highlight the key challenges faced by CEOs in integrating cybersecurity, the importance of communication between the CISO and the board, and the role of regulatory compliance. They also discuss the need to balance cutting-edge cybersecurity solutions with cost considerations and the trends to look out for in the coming years, such as AI-driven security and supply chain security.
In this episode, Matthias Reinwarth discusses the updates to the Identity Fabric and IAM reference architecture with Dr. Philipp Messerschmidt and Martin Kuppinger. The Identity Fabric is a holistic concept that provides seamless yet secure access to every type of identity for every type of service. The update to the Identity Fabric is necessary to reflect the developments in the IAM world, such as new trends in authorization and authentication. The IAM reference architecture provides more detail and functional capabilities for each pillar of IAM. The update also includes the addition of new identity types and the inclusion of architectural concepts like microservice architectures and identity API layers. The Identity Fabric 2025 will be flexible and adaptable to future trends and challenges in IAM.
How can artificial intelligence be used in cybersecurity? Matthias and Alexei asked ChatGPT exactly this question and it came up with quite a list of use cases. They go through this list and discuss it. They explore the different forms of AI aside from generative AI, such as non-generative AI and traditional machine learning. They highlight the limitations and risks associated with large language models like GPTs and the need for more sustainable and efficient AI solutions. The conversation covers various AI use cases in cybersecurity, including threat detection, behavioral analytics, cloud security monitoring, and automated incident response. They emphasize the importance of human involvement and decision-making in AI-driven cybersecurity solutions. Here's ChatGPT's list of AI use cases for cybersecurity: AI for Threat Detection: AI analyzes large datasets to identify anomalies or suspicious activities that signal potential cyber threats. Behavioral Analytics: AI tracks user behavior to detect abnormal patterns that may indicate compromised credentials or insider threats. Cloud Security Monitoring: AI monitors cloud infrastructure, detecting security misconfigurations and policy violations to ensure compliance. Automated Incident Response: AI helps automate responses to cyber incidents, reducing response time and mitigating damage. Malware Detection: AI-driven solutions recognize evolving malware signatures and flag zero-day attacks through advanced pattern recognition. Phishing Detection: AI analyzes communication patterns, spotting phishing emails or fake websites before users fall victim. Vulnerability Management: AI identifies system vulnerabilities, predicts which flaws are most likely to be exploited, and suggests patch prioritization. AI-Driven Penetration Testing: AI automates and enhances pen-testing by simulating potential cyberattacks and finding weaknesses in a network. Anomaly Detection in Network Traffic: AI inspects network traffic for unusual patterns, preventing attacks like Distributed Denial of Service (DDoS). Cybersecurity Training Simulations: AI-powered platforms create dynamic, realistic simulations for training cybersecurity teams, preparing them for real-world scenarios. Threat Intelligence: NLP-based AI interprets textual data like threat reports, social media, and news to assess emerging risks. Predictive Risk Assessment: AI assesses and predicts potential future security risks by evaluating system vulnerabilities and attack likelihood.
SAP has announced the end of life for its identity management (IDM) system, which is a key component in many traditional SAP environments. This poses a challenge for organizations running on-premises SAP systems. To plan for a smooth transition, organizations should consider key strategies such as taking the time for thorough planning, thinking about the future of their IAM, and analyzing requirements before choosing a new solution. The cost of implementation projects can be significant, but investing in proper preparation and tools upfront can save time and money in the long run. It is important to take a holistic view and consider the broader picture, including GRC and access governance solutions. Finding the right solution requires support from experts who understand the market and the organization's specific requirements.
Generative AI is ubiquitous - anyone can use ChatGPT and other tools for free to create text, images, and more. But generative AI also has potential in the professional environment. Businesses should consider how they can leverage the use of AI with prompt engineering etc. In this episode, Alejandro and Matthias discuss the integration of machine learning and AI into cybersecurity infrastructures, particularly SOARs. The conversation covers the role of generative AI in changing the daily tasks of cybersecurity professionals, the challenges of integrating generative AI into SOAR platforms, the importance of prompt engineering, and the need for a balanced approach to innovation and accountability. It also addresses the security and ethical considerations of using AI in cybersecurity and the general impact of generative AI on different industries.
What makes a Web Application Firewall (WAF) a Web Application and API Protection (WAAP) solution? How is the landscape of the market changing and does every organization need a WAAP solution? Tune in to this episode of the Analyst Chat with guest Osman Celik and host Matthias Reinwarth to learn more. Dive deeper into the topic: https://www.kuppingercole.com/research/lc80921/web-application-firewalls
In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Annie Bailey, Research Strategy Director at KuppingerCole Analysts, to discuss the key trends that will shape the cybersecurity landscape through 2025. The conversation explores the increasing complexity of the attack surface, the growing importance of resilience and recovery in cybersecurity strategies, and the dual role of AI as both a threat and a defensive tool. In addition, the discussion covers the impact of emerging regulations, the need for advanced cybersecurity infrastructure, and how organizations can prepare for the anticipated challenges ahead.
In this episode of the KuppingerCole Analyst Chat, host Matthias Reinwarth is joined by Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, to discuss the evolving landscape of identity security. They explore the centrality of Identity and Access Management (IAM) in IT security, the rise of Identity Threat Detection and Response (ITDR), and the latest trends in fraud prevention. The conversation delves into the use of generative AI in cyber-attacks, the importance of gamification in cybersecurity, and the anticipated advancements in ITDR solutions. Join us to gain insights into these critical areas shaping the future of cybersecurity.
Matthias, Martin, John, Alexei, and Mike discuss the recent CrowdStrike incident and its impact on global players. They highlight the need for better software testing and validation processes to prevent such incidents. The conversation also touches on the importance of diversity in software solutions and the role of regulation in ensuring security. The analysts suggest measures such as phased rollout of updates, automated risk scoring, and improved backup and recovery processes. They emphasize the need for organizations to have resilience plans in place and to evaluate the tools and vendors they rely on.
In this episode, Matthias Reinwarth and John Tolbert discuss the consumer identity and access management (CIAM) market. They cover new entrants in the market, the impact of mergers and acquisitions, new features in CIAM products, deployment models, B2B functionality, decentralized identity, and the role of AI in CIAM.
In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth talks to Marina Iantorno, Research Analyst at KuppingerCole Analysts. They explore the concept of digital trust in our AI-driven, interconnected world. The discussion explores the definition and importance of digital trust, the current landscape of AI systems, and examples of successful and failed attempts to build trust. Marina also breaks down key tenets crucial for fostering digital trust, including transparency, data privacy, security, accountability, and more. The episode provides actionable strategies for implementing these tenets and highlights tools and technologies that support digital trust.
In this episode, Matthias hast three guests: his colleagues Phillip, Warwick and Alejandro. They take a look back at EIC 2024 and discuss the most important topics at the upcoming cyberevolution conference. They reflect on the cybersecurity trends and challenges addressed at EIC, including zero trust, decentralized identity, and AI in security. They also highlight the importance of regulations like NIS2 and DORA in driving cybersecurity practices, and mention the key topics for cyberevolution, such as zero trust, AI, and trust in an AI-driven world, as well as the focus on leadership and mental health in cybersecurity.
In this episode, Matthias Reinwarth and Alexei Balaganski discuss the topic of software supply chain security. They explore the different perspectives and challenges surrounding this topic, including the lack of common definitions and the need for practical recommendations. They also discuss the importance of trust in software and the potential solutions, such as software bill of materials and collaboration within the industry. The episode concludes with a call for further discussion and exploration of this complex and evolving topic.
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth discusses the European Identity and Cloud Conference 2024 in Berlin with guests Mike Neuenschwander from KuppingerCole and Adam Callen from Nyedis. They share their first impressions of the conference, highlighting the focus on decentralized identity, regulatory impacts, and future trends in identity management. The conversation also covers the importance of networking at the conference and the evolving landscape of identity technology in Europe. Tune in to gain insights into the latest developments and key topics from EIC 2024.
Matthias is joined by his colleague Warwick Ashford to discuss the upcoming European Identity and Cloud Conference (EIC) 2024 in Berlin. Warwick, a senior analyst at KuppingerCole and the moderator of the keynote section, shares insights on the speakers and sessions to look forward to, including notable keynotes on digital identity, AI, and cybersecurity. The episode covers the importance of interoperability, privacy, and the impact of regulations like eIDAS 2.0 on global digital identity standards. It also highlights the networking opportunities and workshops available at EIC 2024.
In this conversation, John Tolbert interviews Josh Gorrell from Tanium about incident response. They discuss common threats that require incident response, such as ransomware, data breaches, and DDoS attacks. They also touch on the importance of incident response in meeting regulatory compliance requirements and how it can be a competitive advantage for organizations. The conversation covers the key players in an incident response team, best practices for incident response, and metrics for measuring success. They also discuss trends in incident response, including automation and AI.
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth talks with Alexei Balaganski, Lead Analyst and CTO at KuppingerCole Analysts, about the current challenges and future direction of cybersecurity. Alexei shares insights from recent industry events, highlighting the persistent issues despite increased investment in cybersecurity solutions. The discussion delves into the need for a philosophical shift in how security is approached, emphasizing proactive measures over reactive ones. They explore the integration of security into the development of new technologies and stress the importance of collaboration among stakeholders to create secure IT environments. Tune in to gain a deeper understanding of the evolving cybersecurity landscape and the steps necessary to stay ahead.
In this episode of KuppingerCole Analyst Chat, host Matthias Reinwarth speaks with Marina Iantorno, a Research Analyst at KuppingerCole Analysts, about the latest market trends in Identity and Access Management (IAM) and cybersecurity for 2024. They discuss the significant growth rates in Access Management and ITDR, driven by the increasing complexity and sophistication of cyber threats. Marina highlights the evolution of Access Management solutions to support remote workforces and the rising importance of ITDR in proactive threat detection and response. The conversation also covers the steady growth of the email security market in response to phishing and ransomware threats, as well as key strategies businesses are adopting to stay competitive in the IAM space. Finally, they explore the impact of regulatory compliance on IAM solutions and predict future trends in identity-centric security.