<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title>KuppingerCole</title>
		<link>https://www.kuppingercole.com</link>
		<description>KuppingerCole News</description>
				<item>
			<dc:creator>Alejandro Leal</dc:creator>			<pubDate>Thu, 27 Nov 2025 11:50:03 +0100</pubDate>
			<title><![CDATA[VeridiumID]]></title>
			<link>https://www.kuppingercole.com/research/ev81290/veridiumid</link>
			<guid>https://www.kuppingercole.com/research/ev81290/veridiumid</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alejandro Leal</a></p>This KuppingerCole Executive View examines the challenges of securing identity in complex environments and evaluates how Veridium’s platform strengthens authentication, identity assurance, and threat protection across diverse infrastructures.							]]></description>
		</item>
				<item>
			<dc:creator>Alexei Balaganski</dc:creator>			<pubDate>Thu, 27 Nov 2025 10:00:00 +0100</pubDate>
			<title><![CDATA[If You Cannot Trace Your AI’s Decisions, Can You Really Trust Them?]]></title>
			<link>https://www.kuppingercole.com/blog/balaganski/if-you-cannot-trace-your-ais-decisions-can-you-really-trust-them</link>
			<guid>https://www.kuppingercole.com/blog/balaganski/if-you-cannot-trace-your-ais-decisions-can-you-really-trust-them</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alexei Balaganski</a></p><p>Artificial intelligence promises to reshape how we build products, make decisions, and operate entire businesses. Yet the foundations of modern AI are, to put it mildly, problematic. Most models were trained on data gathered through uncontrolled, often unethical, and in many cases outright illegal means. Large models were trained by scraping everything they could find on the public internet with little regard for copyright, accuracy, or the authenticity of sources.</p>
<p>We are now living with the consequences. Many of the answers people receive from today&rsquo;s AI systems trace back not to vetted knowledge or licensed materials, but to random Reddit threads, satirical posts on X, or copyrighted content never attributed to its owners. This is the definition of <i>garbage in, garbage out</i>. Unfortunately, now the garbage is global, automated, and piped straight into decision-making processes.</p>
<p>We have accepted AI slop as a normal part of online life, but the real question is whether we want the same quality standards applied to critical business decisions. So far, the industry still behaves as if the answer was &ldquo;yes&rdquo;. Regulators, however, are beginning to think differently.</p>
<h2>Why Logging Cannot Explain What Your AI Just Did</h2>
<p>The classical approach to governance is built on logs, audit trails, and deterministic processes. Unfortunately, AI systems are none of these things. Training converts data into weights and tokens that cannot be reconstructed. Inference produces outputs that may differ every time the same prompt is used. Retrieval pipelines and agentic workflows bring in external data at runtime, often without any consistent record of what was used or why.</p>
<p>The result is an audit trail with gaps at every critical step. You can often track the inputs and the outputs, but the reasoning chain in between remains hidden. This is why traditional auditability is not the same as provenance. Provenance means being able to demonstrate where the data came from, how it was processed, how it influenced a model, and how that model produced a particular conclusion. Without it, organizations are left with decisions they cannot justify, even if the outcomes appear correct.</p>
<p>And without it, regulators cannot verify whether a model respects copyright or complies with industry rules. The friction between operational expectations and legal requirements is growing, and AI is now part of the software supply chain. That means your model vendor&rsquo;s training data becomes your compliance risk.</p>
<h2>The Regulatory Pressure Behind Provenance</h2>
<p>Regulators did not start with explainability or algorithmic fairness. They started with copyright, because it is the most obvious and easiest to verify. Copyright owners have already demonstrated that training on protected content without permission is a violation, regardless of how useful the resulting model may be. This alone is driving the first round of regulatory intervention.</p>
<p>But copyright is only the beginning. Industries that rely on strong governance, including identity management and cybersecurity, face an even more fundamental problem. If the data feeding AI-driven decisions is incomplete, inaccurate, or unverifiable, those decisions become unreliable. For example, an access control recommendation based on a hallucination or a low-quality data source is not simply incorrect but a potential breach in the making.</p>
<p>This is why data provenance will evolve into the next major compliance requirement. The industry went through the same shift with privacy, culminating in GDPR and other similar frameworks. AI data provenance must follow the same path. Not because regulators enjoy making life difficult, but because the alternative is a world where critical infrastructure depends on unverifiable decisions made by systems that no one can fully trust.</p>
<h2>What Organizations Should Do Now</h2>
<p>No enterprise can solve the provenance challenge overnight. You cannot simply bolt another governance tool onto an AI system after it has been deployed. Provenance must be embedded across the entire lifecycle, from training and data preparation to inference and downstream actions. Still, there are practical steps you can take today.</p>
<p><strong>Start with your data:&nbsp;</strong>A living data catalog is essential. If you cannot identify where your data is stored, how it is classified, and how it flows into your AI systems, you cannot demonstrate compliance or ensure quality.</p>
<p><strong>Work from risk:&nbsp;</strong>Identify the decisions where AI poses the greatest operational risk. Prioritize governance there. Not every use case requires the same level of scrutiny.</p>
<p><strong>Use the controls you already have:&nbsp;</strong>Many data security and governance tools already support lineage, classification, and monitoring. These remain valid. The challenge is extending them consistently to the entire AI layer, not replacing everything with untested solutions.</p>
<p><strong>Demand transparency from vendors:&nbsp;</strong>Ask for training data disclosures. Ask how they track provenance internally. Ask what mechanisms they offer to trace inference data, external calls, and agent actions. Marketing assurances are not proof.</p>
<p><strong>Prepare for explainability:&nbsp;</strong>If you cannot explain how an AI reached its conclusion, you cannot defend it during an audit or investigation. Explainability is becoming a baseline requirement, not a luxury.</p>
<p>The industry is beginning to converge on the idea of a unified governance fabric that spans data, models, and operational context. Data provenance will be a core part of that fabric. It is early, fragmented, and evolving quickly, but ignoring it will only make future regulatory pressure more difficult and more expensive.</p>
<p>AI will continue to shape digital businesses. The real question is whether it will do so transparently and responsibly or continue to rely on invisible data pipelines and unverifiable decisions. Keeping the entire chain under consistent governance is the foundation that separates reliable and trustworthy AI from slop, and it will soon be a fundamental part of compliance for every organization building or deploying AI systems.</p>
<p>A practical way forward begins with establishing a baseline of provenance capabilities that every enterprise can realistically implement today. At a minimum, this means knowing where your data comes from, documenting how it is cleaned, transformed, and used during model training, and maintaining enough visibility to trace which inputs and external calls influenced a particular inference.</p>
<p>None of this requires full interpretability or revealing a model&rsquo;s internal mechanics. What it does provide is the ability to justify decisions, survive audits, and defend your AI processes when questions arise. With this foundation in place, organizations can adopt AI with more confidence while preparing for the regulatory expectations that are already taking shape.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Matthias Reinwarth</dc:creator>			<pubDate>Wed, 26 Nov 2025 13:09:35 +0100</pubDate>
			<title><![CDATA[Identity at the Speed of Business - From Architecture to Organizational Value]]></title>
			<link>https://www.kuppingercole.com/research/an82011/identity-at-the-speed-of-business-from-architecture-to-organizational-value</link>
			<guid>https://www.kuppingercole.com/research/an82011/identity-at-the-speed-of-business-from-architecture-to-organizational-value</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Matthias Reinwarth</a></p>Identity management is accelerated by transitioning IAM from isolated tools to a structured, modular architecture. The Identity Fabric and IAM Reference Architecture provide frameworks for defining IAM capabilities, enabling faster onboarding and better policy enforcement. This model shifts IAM delivery from projects to continuous, service-oriented execution, aligning it more closely with business priorities and outcomes.							]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Wed, 26 Nov 2025 09:35:32 +0100</pubDate>
			<title><![CDATA[Apple’s Digital ID Move: Helpful Progress, but Not Yet the Breakthrough]]></title>
			<link>https://www.kuppingercole.com/blog/kuppinger/apples-digital-id-move-helpful-progress-but-not-yet-the-breakthrough</link>
			<guid>https://www.kuppingercole.com/blog/kuppinger/apples-digital-id-move-helpful-progress-but-not-yet-the-breakthrough</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p><p class="p1">Apple has introduced support for digital IDs within its Wallet. This has attracted immediate attention, not because the concept is new, but because Apple&rsquo;s scale reliably shifts discussions from specialist circles into the public domain. This alone will influence the trajectory of digital ID adoption. Yet the question remains whether this is a strategic breakthrough or a narrowly scoped convenience feature.&nbsp;</p>
<h2 class="p1">Visibility Without the Full Vision&nbsp;</h2>
<p class="p1">Apple&rsquo;s involvement undeniably increases visibility. For years, the potential of reusable digital identities, verifiable credentials, and decentralized identity models has been explored largely within technical and policy communities. Now the subject appears in a mainstream consumer product.&nbsp;</p>
<p class="p1">However, visibility should not be mistaken for completeness. Apple is not introducing a digital identity in the architectural sense. The Wallet simply stores a digital representation of an existing, state-issued document. This mirrors the physical-world model where a wallet contains various ID cards. It does not reflect the larger objective of building a reusable, attribute-rich identity framework composed of verifiable credentials.&nbsp;</p>
<p class="p1">Modern digital identity initiatives aim to support extensive, controlled sets of attributes, enabling automation, reducing friction, and supporting cross-organizational processes. Against this backdrop, the current Apple approach remains narrow.&nbsp;</p>
<h2 class="p1">Limited Use Cases, Limited Impact&nbsp;</h2>
<p class="p1">The supported use cases such as age verification or presenting a mobile driver&rsquo;s license are legitimate and practically useful. Selective disclosure, such as demonstrating legal age without exposing full personal data, is a relevant improvement for privacy.&nbsp;</p>
<p class="p1">Yet these use cases represent only a small fraction of the potential. Employee onboarding, automated access governance in partner ecosystems, and streamlined KYC/AML processes in financial services require significantly richer sets of verifiable credentials. These scenarios are where the substantial business value lies. Apple&rsquo;s implementation does not currently demonstrate readiness for such broader application.&nbsp;</p>
<p class="p1">In that sense, the initiative is a step forward, but far from the digital identity model needed for scalable enterprise or governmental processes.&nbsp;</p>
<h2 class="p1">The Constraint of Device-Bound Identities&nbsp;</h2>
<p class="p1">A structural limitation lies in the device-centric approach. A digital identity designed for serious, cross-context use cannot depend exclusively on a single hardware device. Users operate across multiple devices in both personal and professional contexts. Financial processes, workforce onboarding, and corporate interactions demand flexibility and device independence.&nbsp;</p>
<p class="p1">The wallet must be able to roam with the user, not remain bound to a specific device. This requirement applies not only to Apple; several wallet initiatives face the same challenge. A sustainable identity architecture must be decentralized, portable, and independent of specific hardware vendors.&nbsp;</p>
<h2 class="p1">Standards Are Present, but Ambition Must Match&nbsp;</h2>
<p class="p1">Apple relies on established standards such as mDoc, ISO specifications, and FIDO. This is beneficial and provides a foundation for interoperability. However, standards alone do not ensure that the implementation aligns with the broader strategic intent of reusable digital identities.&nbsp;</p>
<p class="p1">The long-term model resembles a distributed catalogue of verifiable credentials rather than a small collection of digital ID cards. Not all credentials can reside in secure elements. Many attributes must be retrieved, validated, and combined dynamically across different identity sources.&nbsp;</p>
<p class="p1">This complexity underpins the automation potential that enterprises seek: reducing manual checks, accelerating decision-making, and improving assurance levels. Apple&rsquo;s current implementation is not positioned to deliver on this.&nbsp;</p>
<h2 class="p1">A Multi-Wallet Reality&nbsp;</h2>
<p class="p1">Enterprises will not be able to rely on a single wallet. Apple&rsquo;s ecosystem is large, but it is not universal. The EU&rsquo;s EUDI Wallet, Android-based wallets, and emerging identity solutions from other major platforms will coexist. Cross-border use cases reinforce this reality.&nbsp;</p>
<p class="p1">Organizations must therefore prepare for a multi-wallet environment. They will need abstraction layers capable of integrating with numerous wallet providers rather than building point solutions for individual ecosystems. Apple&rsquo;s initiative reinforces the urgency of this architectural consideration.&nbsp;</p>
<h2 class="p1">Moving From Standards Work to Real Use&nbsp;</h2>
<p class="p1">Despite the limitations, the development is significant because it shifts digital identity from a standards-driven discourse toward practical, observable use. Early implementations in ecosystems such as Microsoft&rsquo;s LinkedIn Verified identity show that multiple players are moving, and actual deployments are beginning to surface.&nbsp;</p>
<p class="p1">At upcoming industry events such as <a href="https://www.kuppingercole.com/events/eic2026" target="_self">EIC</a>, these developments will be central: how interoperable, standards-based identity ecosystems can be established; how wallets can interoperate; and how organizations should architect their identity fabrics in anticipation of multiple wallet types.&nbsp;</p>
<p class="p1">Apple&rsquo;s announcement contributes to this momentum. It is a practical step, not yet a strategic transformation. The broader journey toward scalable, reusable, verifiable digital identities continues. It will require a far more comprehensive approach than what Apple currently delivers.&nbsp;</p>							]]></description>
		</item>
				<item>
			<dc:creator>Osman Celik</dc:creator>			<pubDate>Tue, 25 Nov 2025 12:58:47 +0100</pubDate>
			<title><![CDATA[Brand Protection]]></title>
			<link>https://www.kuppingercole.com/research/bc80865/brand-protection</link>
			<guid>https://www.kuppingercole.com/research/bc80865/brand-protection</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Osman Celik</a></p>Organizations face cyber threats like impersonation, domain spoofing, and counterfeit products spreading rapidly online. Common issues include slow legal enforcement and operational barriers. Brand protection platforms emerge as solutions, offering global monitoring and AI-driven threat detection, integrating across digital and physical channels. These systems enhance brand security through takedown services, compliance support, and advanced brand intelligence.							]]></description>
		</item>
				<item>
						<pubDate>Tue, 25 Nov 2025 10:56:25 +0100</pubDate>
			<title><![CDATA[Jan 15, 2026: Building Trustworthy AI Agents Through Modern Identity Control]]></title>
			<link>https://www.kuppingercole.com/events/trustworthy-ai-agents</link>
			<guid>https://www.kuppingercole.com/events/trustworthy-ai-agents</guid>
			<description><![CDATA[ AI agents increasingly act on users’ behalf, yet their decisions often lack clear authority, control, and transparency, intensifying an already fragile state of digital trust. To close this gap, identity architecture must evolve. An Agentic Identity Framework, supported by CIAM platforms like Auth0, enforces explicit delegation, limits agent privileges, and creates auditable, user-aligned decision paths that keep AI activity accountable.							]]></description>
		</item>
				<item>
			<dc:creator>Nitish Deshpande</dc:creator>			<pubDate>Mon, 24 Nov 2025 14:08:47 +0100</pubDate>
			<title><![CDATA[Non-Human Identity Management]]></title>
			<link>https://www.kuppingercole.com/research/lc80974/non-human-identity-management</link>
			<guid>https://www.kuppingercole.com/research/lc80974/non-human-identity-management</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Nitish Deshpande</a></p>Non-human identities (NHIs) now outnumber human users, operating across cloud, SaaS, and on-prem environments, creating new IT security challenges. The rise of NHIs requires dedicated governance models distinct from traditional IAM. Automated lifecycle management, policy enforcement, and advanced technologies such as AI are crucial for provisioning, detecting, and securing NHIs to mitigate security risks.							]]></description>
		</item>
				<item>
			<dc:creator>Osman Celik</dc:creator>			<pubDate>Mon, 24 Nov 2025 09:00:00 +0100</pubDate>
			<title><![CDATA[Why We Need to Map Our Attack Surface]]></title>
			<link>https://www.kuppingercole.com/blog/celik/why-we-need-to-map-our-attack-surface</link>
			<guid>https://www.kuppingercole.com/blog/celik/why-we-need-to-map-our-attack-surface</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Osman Celik</a></p><p>Modern attacks usually start somewhere unexpected, such as a forgotten asset, an inherited domain from an old acquisition, or a misconfigured VPN gateway. All of these are part of your attack surface. And attackers are already mapping it. The question is whether you are doing a good job as they are. In this blog, I will explain why systematic attack surface mapping is essential to your cybersecurity strategy, how it improves vulnerability prioritization and contextualization, how MITRE ATT&amp;CK mapping fits into this, and how CyCognito approaches this concept.</p>
<p>At a basic level, your attack surface is the sum of all the points where an attacker could try to interact with your systems:</p>
<ul>
<li>Internet-facing assets</li>
<li>IP ranges, domains, and certificates tied to your brand or subsidiaries</li>
<li>Cloud services and external SaaS dependencies</li>
<li>VPNs, remote access gateways, email infrastructure</li>
<li>IoT and OT/ICS equipment reachable from outside</li>
</ul>
<p>Cybersecurity regulations and standards are increasingly explicit about this. ENISA, for example, highlights <a href="https://www.enisa.europa.eu/sites/default/files/2024-11/Cyber%20Resilience%20Act%20Requirements%20Standards%20Mapping%20-%20final_with_identifiers_0.pdf?" title="attack surface minimization" target="_blank">attack surface minimization</a>&nbsp;as a core design principle in its work on cybersecurity standards, and notes that the size of the attack surface is a key factor for security analysis and assurance.</p>
<p>My observation on this matter is simple. As an organization, if you do not have a reliable map of what could actually be exposed, everything between vulnerability management and incident response is built on guesswork. Good attack surface mapping is not just a nice asset inventory; it should shift the starting question from &ldquo;What do we think we own?&rdquo; to &ldquo;What can an attacker actually see and reach?&rdquo;</p>
<p>Properly executed attack surface mapping bridges organizational blind spots by incorporating subsidiaries, acquisitions, third-party infrastructure, temporary projects, and retired brands with live DNS records or certificate footprints. It normalizes and enriches data by pulling in DNS, WHOIS, certificates, banners, screenshots, and ownership relationships. Then, it connects those dots to create a map of your real business structure. It also keeps up with what is changing. Cloud deployments, mergers, outsourcing, and shadow IT constantly redraw your attack surface. A yearly CMDB review simply cannot keep up with that pace.</p>
<p><a href="https://www.enisa.europa.eu/sites/default/files/publications/ENISA%20Report%20-%20SCSA%20Methodology.pdf?" title="ENISA's work" target="_blank">ENISA&rsquo;s work</a>&nbsp;on sectoral cybersecurity assessment notes that the dimension of the attack surface is also an indicator of the effort required for vulnerability analysis. The bigger and more fragmented your exposed estate, the more you need automation that thinks like a recon team rather than a static catalog. This is exactly why our <a href="https://www.kuppingercole.com/research/lc80874/attack-surface-management">recent research</a> on attack surface management (ASM) emphasize continuous, ownership-aware discovery rather than one-time scans or questionnaires.</p>
<p>Once you have a reasonably accurate map, you no longer ask &ldquo;Which Common Vulnerabilities and Exposures (CVEs) are high severity?&rdquo; but instead &ldquo;Which of these issues actually matter in this environment, on this asset, given this exposure and business role?&rdquo; That is where attack surface mapping feeds directly into prioritization and contextualization.</p>
<p>In theory, organizations already know that risk is a function of likelihood and impact. <a href="https://www.enisa.europa.eu/publications/risk-management-standards" title="ENISA" target="_blank">ENISA</a>&nbsp;summarizes this clearly. To manage cyber risk, you have to identify the appearance of risks, accurately assess the impact and likelihood of these risks, and aggressively determine how to treat individual risks.</p>
<p>Attack surface mapping gives you three key ingredients for turning raw vulnerability data into meaningful risk:</p>
<p>1. Exposure context</p>
<ul>
<li>Is the asset directly internet-facing, behind a VPN, or accessible only from a partner network?</li>
<li>Is it located on a shared cloud platform with other critical services?</li>
<li>Are there obvious attack paths from this asset into more sensitive segments?</li>
</ul>
<p>2. Business context</p>
<ul>
<li>Which business unit owns it?</li>
<li>Does it process payment transactions or healthcare data?</li>
<li>Would downtime be a regulatory incident?</li>
</ul>
<p>3. Technical context</p>
<ul>
<li>How discoverable is it from the outside?</li>
<li>How attractive is the asset from an attacker&rsquo;s perspective?</li>
</ul>
<p>A CVE with a &ldquo;medium&rdquo; base score is fundamentally different from the same CVE on an internet-facing customer portal with privileged access. Without mapping, both may appear as similar tickets in your vulnerability list. With mapping, one becomes a top-priority issue, and the other is something you can schedule more calmly. Modern ASM solutions reflect this shift. Rather than simply adding vulnerabilities to an already overloaded queue, they cluster findings around assets and attack paths, not just CVE IDs. They also overlay external threat intelligence to highlight where exploitation is already happening in the wild and use risk scores that incorporate discoverability, attractiveness, exploitability, and business impact, not just CVSS.</p>
<p>That is the direction the industry is moving anyway. Our recent analyses of the ASM market point out that in 2025, ASM is no longer just about visibility but about context, prioritization, and remediation, with continuous discovery as the baseline.</p>
<h2>What MITRE ATT&amp;CK mapping actually is and why it matters?</h2>
<p>MITRE is an independent, US-based non-profit that runs Federally Funded Research and Development Centers (FFRDCs) and works across government, academia, and industry. Among other things, it maintains the <a href="https://attack.mitre.org/" title="MITRE ATT&amp;CK framework" target="_blank">MITRE ATT&amp;CK framework</a>. MITRE describes attack as a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. It is essentially a structured catalog of how attackers behave during real intrusions, from initial access all the way through lateral movement, credential theft, data exfiltration, and impact. According to MITRE, the ATT&amp;CK knowledge base is used as a foundation for developing threat models and methodologies across the private sector, government, and the cybersecurity community.</p>
<p>When we talk about MITRE ATT&amp;CK mapping in the context of ASM, we are usually referring to three things:</p>
<ul>
<li>Linking assets and vulnerabilities to likely techniques</li>
<li>Assessing coverage of controls and detections (e.g., Do we have detections, guidelines, or playbooks for these specific behaviors?)</li>
<li>Aligning threat intelligence and incidents with your attack surface</li>
</ul>
<p>The result is much more than an attractive matrix on a slide. It becomes a practical mechanism for prioritizing remediation when multiple techniques target the same asset or entry point. It is also a shared language that aligns red teams, blue teams, and management when discussing risk. Additionally, it is a measurable way to track progress over time. Rather than focusing solely on the number of closed vulnerabilities, organizations can monitor the percentage of MITRE ATT&amp;CK techniques to which their internet-facing assets remain exposed, creating a clearer picture of real-world risk.</p>
<p>In short, MITRE ATT&amp;CK help you move from &ldquo;We know we have vulnerabilities&rdquo; to &ldquo;We know which entry points map to real attacker behaviors, and we know what to fix first.&rdquo;</p>
<h2>How CyCognito approaches attack surface mapping and risk</h2>
<p><a href="https://www.cycognito.com/)" title="CyCognito" target="_blank">CyCognito</a>&nbsp;is a cybersecurity vendor that specializes in the proactive management of attack surfaces and automated security testing. The company emphasizes seeing organizational assets the way an external attacker would.</p>
<p>One recurring problem in ASM is that many tools still begin with a customer-provided seed list of domains, IP ranges, or asset inventories. While this is useful, it also incorporates your blind spots. CyCognito&rsquo;s approach is explicitly seedless for external discovery. According to them, <a href="https://www.cycognito.com/platform/features.php" title="seedless discovery" target="_blank">seedless discovery</a>&nbsp;is designed to reveal your attack surface just like attackers do, without requiring asset lists or extensive setup. This method can identify significantly more vulnerabilities than traditional approaches.</p>
<p>Behind the scenes, the platform uses large-scale reconnaissance techniques, open-source intelligence (OSINT), natural language processing (NLP), and graph-based mapping to create a dynamic inventory of assets and link them to the organization&rsquo;s actual business structure. This approach makes forgotten or inherited assets, such as old subsidiaries, retired brands, or third-party hosted systems, visible again. It treats all internet-facing assets as unknown until confirmed, which more closely aligns with how attackers view an organization than any CMDB-driven process does. The platform also incorporates ownership attribution directly into the mapping process, making it easier to route remediation to the right teams. CyCognito&rsquo;s exploit intelligence module pulls data from a mix of surface web, social media, dark and deep web sources, supported by human analysts and automated algorithms. It categorizes threats using MITRE ATT&amp;CK and correlates findings back to specific assets that need remediation.</p>
<p>In our last <a href="https://www.kuppingercole.com/research/lc80874/attack-surface-management">Leadership Compass on ASM</a>, we found that CyCognito&rsquo;s risk scoring merges several layers of risk insight. It incorporates results from active security testing and vulnerability scanning, combines both external and internal threat intelligence, and evaluates asset-level factors such as discoverability, attractiveness, potential impact, and business importance. It also includes practical considerations like remediation complexity. This type of risk scoring aligns well with what regulators and agencies are asking for: shifting from one-dimensional views of severity to risk factors that consider likelihood, impact, and exposure. When combined with MITRE ATT&amp;CK mapping, you can see not only how severe a vulnerability is, but also which attacker techniques it enables on a given asset and how discoverable that asset is.</p>
<p>Mapping the attack surface is not a one-time task that can be fully outsourced to annual penetration tests. It is the foundation on which vulnerability management, incident response, threat hunting, and compliance rely. With an accurate, continuously updated map, you can enrich the risk context of every vulnerability detected, speak a shared language about attacker behaviors via MITRE ATT&amp;CK, and focus on issues that may have a greater impact on your organization.</p>
<p>At the end of the day, you either own your attack surface map, or attackers will draw it for you. And they will not be prioritizing in your favor.</p>							]]></description>
		</item>
				<item>
						<pubDate>Mon, 24 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Why Data Provenance Will Define the Next Phase of AI Compliance]]></title>
			<link>https://www.kuppingercole.com/watch/ai-data-provenance</link>
			<guid>https://www.kuppingercole.com/watch/ai-data-provenance</guid>
			<description><![CDATA[ <p><span>In this week's episode, Matthias Reinwarth and Alexei Balaganski discuss the growing importance of AI Data Provenance. The conversation explores why provenance is distinct from traditional logging, the operational gaps between ML engineering practices and regulatory expectations, and the regulatory context driving these requirements. </span></p>
<p><span>They get into the risks of attempting to retrofit governance after AI systems are already deployed and explain why provenance must be built directly into data and model workflows. </span></p>
<p><span>&nbsp;Key Topics Covered: <br />✅ AI data provenance is a new and urgent issue. <br />✅ Low-quality data leads to poor AI outcomes. <br />✅ Auditing and compliance are essential for AI systems. <br />✅ Organizations must establish governance for AI data. <br />✅ Data catalogs and traceability are foundational. <br />✅ Prepare for AI regulations like GDPR. <br />✅ Start small and apply a risk-based approach. <br />✅ Never trust, always verify your data sources.</span></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/ai-data-provenance"><img src="https://www.kuppingercole.com//videothumb/ai-data-provenance/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 21 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Beyond the Vault: Closing the Gaps PAM Left Behind]]></title>
			<link>https://www.kuppingercole.com/watch/beyond-the-vault</link>
			<guid>https://www.kuppingercole.com/watch/beyond-the-vault</guid>
			<description><![CDATA[ <p>How many admin passwords are floating around in your organization right now? How many hard-coded secrets live inside scripts or CI/CD pipelines? For most enterprises, the answer is &ldquo;too many.&rdquo; Traditional PAM tools promised control, but in practice they&rsquo;re patchworks of code that don&rsquo;t cover the realities of cloud, SaaS and DevOps.</p>
<p>Credentials and secrets are being stolen faster than evera nd legacy PAM simply wasn&rsquo;t built for machine identities, containerized workloads or hybrid infrastructures. The new standard is agile, converged platforms that combine PAM with IGA and EPM, using AI and behavioral analytics to close the gaps vaults can&rsquo;t.</p>
<p>Modern PAM must go beyond vaults to focus on usability, scalability, and real-world applicability, such as detecting shadow IT accounts, mitigating insider threats, and securing third-party access. As competition and innovation accelerate, converged PAM platforms are redefining how enterprises protect their most critical assets and maintain trust in an interconnected world.</p>
<p><strong>Alejandro Leal, Senior Analyst </strong>at<strong> KuppingerCole,</strong> will provide a strategic perspective on the state of PAM today. He will discuss why many existing solutions fall short, highlight the key attributes of a modern PAM platform, and outline how convergence across PAM, IGA, and EPM creates an integrated identity security fabric for digital enterprises.</p>
<p><strong>Pranay Bhatia</strong>, <strong>Head of Privilege Access Management </strong>at<strong> ARCON</strong>, and <strong>Siddharth Venkataraman, Identity Security Head and SME&nbsp;</strong>at<strong> Mastek</strong>, will share real-world insights from customer journeys. Together, they&rsquo;ll discuss how organizations are tackling key challenges such as secrets management, secure DevOps, and passwordless access. They&rsquo;ll also present ARCON&rsquo;s vision for converged identity platforms and highlight the capabilities enterprises should expect from next-generation PAM solutions.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/beyond-the-vault"><img src="https://www.kuppingercole.com//videothumb/beyond-the-vault/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Thu, 20 Nov 2025 08:13:32 +0100</pubDate>
			<title><![CDATA[Jan 13, 2026: The Future of Cloud Security]]></title>
			<link>https://www.kuppingercole.com/events/future-of-cloud-security</link>
			<guid>https://www.kuppingercole.com/events/future-of-cloud-security</guid>
			<description><![CDATA[ Cloud security is struggling to keep pace. Despite massive investment in CNAPP tools, response times remain painfully slow and attackers exploit cloud exposures within minutes. The root cause is fragmentation: CNAPP and SOC teams operate in silos. Closing this gap requires a converged, real-time model that unifies posture, runtime insights and operational response across multicloud environments.							]]></description>
		</item>
				<item>
			<dc:creator>Warwick Ashford</dc:creator>			<pubDate>Wed, 19 Nov 2025 12:55:44 +0100</pubDate>
			<title><![CDATA[Analyst’s View: Secure Remote Access for OT/ICS]]></title>
			<link>https://www.kuppingercole.com/research/an82010/analyst-s-view-secure-remote-access-for-ot/ics</link>
			<guid>https://www.kuppingercole.com/research/an82010/analyst-s-view-secure-remote-access-for-ot/ics</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Warwick Ashford</a></p>Secure Remote Access (SRA) has become indispensable for organizations managing Operational Technology (OT) and Industrial Control Systems (ICS). As industries integrate digital capabilities and remote operations expand, secure connectivity is no longer optional. SRA enables maintenance, monitoring, and support across distributed assets while protecting production processes from unauthorized access and cyber threats.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 19 Nov 2025 09:33:16 +0100</pubDate>
			<title><![CDATA[Jan 22, 2026: Creating a Unified View of Identity Risk]]></title>
			<link>https://www.kuppingercole.com/events/unified-view-of-identity-risk</link>
			<guid>https://www.kuppingercole.com/events/unified-view-of-identity-risk</guid>
			<description><![CDATA[ Enterprises now manage identities that span employees, partners, customers, workloads, and emerging AI agents, each with different risk profiles and lifecycle demands. Disconnected governance, access, and threat-detection tools make it difficult to enforce policy consistently or respond to attacks quickly. An identity security fabric provides a unified architectural layer that centralizes visibility, standardizes controls, and automates responses across every identity and system.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Rethinking Identity Security for Enterprises in the Age of AI]]></title>
			<link>https://www.kuppingercole.com/watch/rethinking-identity-security</link>
			<guid>https://www.kuppingercole.com/watch/rethinking-identity-security</guid>
			<description><![CDATA[ <p>AI has already slipped inside of enterprises. Employees are experimenting with generative tools, vendors are embedding AI features into platforms, and business units are spinning up AI agents without security sign-off. The result? A growing shadow workforce of non-human identities that few organizations even acknowledge, let alone govern.</p>
<p>Legacy identity programs were built for people and service accounts, not autonomous systems. Pretending AI is &ldquo;just another user&rdquo; is a dangerous simplification. To survive the AI gold rush, enterprises must classify AI as a distinct identity type, subject it to strict governance, and enforce controls as strong or stronger than those applied to human employees.</p>
<p>Nitish Deshpande, Research Analyst at KuppingerCole will challenge conventional thinking around AI governance. They will highlight why legacy IAM frameworks fail when faced with autonomous decision-makers, discuss the ethical and regulatory blind spots most organizations ignore, and argue that AI identities require a radically different trust model.</p>
<p>Simon Gooch, Field CIO at Saviynt, will share insights from his extensive experience leading global IT and security transformations. He will discuss how Saviynt Identity Cloud enables organizations to secure all identities, human, machine, and AI, and will highlight real-world use cases where enterprises have achieved measurable outcomes by consolidating and modernizing their identity platforms.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/rethinking-identity-security"><img src="https://www.kuppingercole.com//videothumb/rethinking-identity-security/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Alexei Balaganski</dc:creator>			<pubDate>Tue, 18 Nov 2025 14:20:00 +0100</pubDate>
			<title><![CDATA[If APIs Are the Perimeter Now, Why Are We Treating Them Like Hobby Projects?]]></title>
			<link>https://www.kuppingercole.com/blog/balaganski/if-apis-are-the-perimeter-now</link>
			<guid>https://www.kuppingercole.com/blog/balaganski/if-apis-are-the-perimeter-now</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alexei Balaganski</a></p><p>We are certainly living in interesting times. Some call it a Chinese curse; I prefer to think of it as a confusing but exciting transition period where every digital ambition is suddenly possible and every mistake can become catastrophic. The world we once knew with strong network perimeters and a handful of enterprise systems has evolved into a sprawling mesh of clouds, devices, SaaS platforms, partners, agents, and applications we barely control. Anything in that mesh can be the weak point. And when it is, everything connected to it feels the impact.</p>
<p>The most ironic part is that the weakest points are often the places we still treat as plumbing. APIs were once simple connectors, but today they are more like the circulatory system for your entire business. They carry your data, your workflows, your customer interactions, your partner integrations, and increasingly your AI-driven automation. If APIs stop working, the business stops breathing.</p>
<p>And breathing is the operative word here, because data is no longer oil, gold, or crown jewels - it is the new air. You cannot put it into a safe. If your scuba gear leaks, you do not lose profit, you suffocate and drown. APIs are that scuba gear because they keep your digital business alive. In other words, they are the new critical infrastructure.</p>
<h2>APIs as lifelines, not endpoints</h2>
<p>For years, we at KuppingerCole tried to explain that APIs are business interfaces, not developer conveniences. Progress was slow until generative AI arrived and made every organization rethink itself as an API provider. You cannot have an AI strategy without APIs. You cannot participate in modern ecosystems without APIs. Everything now talks to everything else through APIs, often with little oversight or governance. One can even say that, perhaps, too many things now come with an API.</p>
<p>This rapid expansion has created the most eclectic environment imaginable. REST next to GraphQL next to gRPC next to Kafka streams next to some forgotten SOAP service running in the basement because nobody dares turn it off. Hybrid deployments, multi-cloud regions, edge nodes, legacy monoliths&hellip; Shadow APIs that were never documented. Zombie APIs that should have been retired years ago. It is no longer a fortress but a gothic fantasy castle of Escherian architecture, complete with hidden passages and impossible trapdoors.</p>
<p>If you want a framing that boards actually respond to, stop talking about endpoints and start presenting products. Products have clear ownership, documentation, onboarding, metrics, customer support, and a lifecycle. Products can be marketed, improved, and sometimes monetized. Treating APIs as products is what turns a fragile ecosystem into something you can manage at scale.</p>
<p>Think of what Netflix did to movie piracy. They didn&rsquo;t stop people from copying; they built a better experience with easy access, fair pricing, and built-in copyright protection. Every company today faces the same choice. Being &ldquo;the Netflix of your digital assets&rdquo; is not about hype, it is about beating the pirates. If you do not make your data easy to find, use, and trust, someone else will happily scrape it, resell it, or use it to train a model you will never benefit from.</p>
<h2>Stronger gates, not higher walls</h2>
<p>Once you recognize that APIs are delivering your air supply, the security discussion changes. Old perimeter thinking has no place in this world. The API has become the perimeter. And like any perimeter worth having, it needs gates, not walls.</p>
<p>Security that focuses on shutting things down is outdated. Security that ensures business processes work correctly is what accelerates growth. Preventing business logic abuse is far more important than blocking generic traffic. Demonstrating prevented fraud and avoided downtime is far more compelling than talking about compliance. Good API security lets you onboard partners faster, expose products more effectively, and operate across ecosystems without fear.</p>
<p>This is where identity becomes unavoidable. There has never been API security without identity. Not the old version with passwords and brittle login forms, but identity that spans devices, partners, contractors, customers, and now AI agents. Identity is what turns an exposed interface into a trusted business relationship. Continuous authorization, passwordless access, verifiable credentials, and unified identity fabrics. These are no longer optional because they are the trust layer for the entire API economy.</p>
<h2>The supply chain you did not know you were running</h2>
<p>APIs have become the new supply chain. If your partner is compromised, your business may be the one that makes the headlines. If your API is misconfigured, you might be the backdoor into someone else&rsquo;s environment. Studies consistently show that API breaches cost far more than traditional data breaches because they reverberate across ecosystems.</p>
<p>In medieval terms, your enterprise is not a standalone castle anymore. It is now a part of a long chain of fortifications, and if one link breaks, everything collapses. The strongest fortresses are not the ones that build thicker walls; they are the ones with smarter gates where trusted allies can pass without exposing the whole kingdom.</p>
<p>That is the mindset shift the API economy demands. Not more tools or dashboards. You need real product thinking, real identity-centric security, and real governance. APIs are already where your business logic flows. They are already carrying your air. The question is whether you treat them as accidental plumbing or as the digital products that determine your competitiveness.</p>
<p>Because in these interesting times, only the latter has a future.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Mike Small</dc:creator>			<pubDate>Mon, 17 Nov 2025 09:14:37 +0100</pubDate>
			<title><![CDATA[Rising Star AuthZed]]></title>
			<link>https://www.kuppingercole.com/research/rs81131/rising-star-authzed</link>
			<guid>https://www.kuppingercole.com/research/rs81131/rising-star-authzed</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Mike Small</a></p>AuthZed provides scalable authorization solutions leveraging SpiceDB for global, fine-grained permissions. Supported by $15.8M funding, their cloud products optimize performance and deployment flexibility. With innovative Materialize technology, AuthZed enhances rapid permission checks. Despite challenges in a saturated market, their open-source approach and comprehensive service portfolio provide competitive advantages across diverse industries and organizational sizes.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 17 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Mastering IT Governance: Strategy, Compliance & the 1.5 Line of Defense]]></title>
			<link>https://www.kuppingercole.com/watch/mastering-it-governance</link>
			<guid>https://www.kuppingercole.com/watch/mastering-it-governance</guid>
			<description><![CDATA[ <p>IT governance isn&rsquo;t just paperwork anymore, it&rsquo;s becoming a critical foundation for how modern organizations operate, stay secure, and stay compliant. This week, <strong>Matthias Reinwarth</strong> is joined by advisors <strong>Kai Boschert</strong> and <strong>Patrick Teichmann</strong> to break down what effective IT governance actually looks like in 2025.</p>
<p>Together, they unpack:</p>
<p>✅ What IT governance <em>really</em> is &mdash; and how it bridges strategy and operations<br />✅ The differences (and overlaps) between <strong>strategy</strong>, <strong>governance</strong>, and <strong>compliance<br /></strong>✅ Why the &ldquo;<strong>1.5 line of defense</strong>&rdquo; model helps close crucial gaps<br />✅ The role of target operating models in making governance work at scale<br />✅ How to bring stakeholders, processes, and tools together effectively<br />✅ Practical steps to start improving governance today &mdash; without boiling the ocean</p>
<p>Whether you&rsquo;re shaping governance for a large enterprise or just beginning to formalize your processes, this conversation delivers real-world insights from active advisory work with end-user organizations.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/mastering-it-governance"><img src="https://www.kuppingercole.com//videothumb/mastering-it-governance/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 14 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Transforming APIs from Endpoints to Business Products]]></title>
			<link>https://www.kuppingercole.com/watch/endpoints-to-business-products</link>
			<guid>https://www.kuppingercole.com/watch/endpoints-to-business-products</guid>
			<description><![CDATA[ <p>APIs are the nervous system of modern enterprises, or at least they should be. In reality, many organizations still treat them as side projects, exposing services and data without a coherent plan. The result is growth on one side and systemic risks on the other, sometimes powerful enough to derail the very innovation APIs were meant to deliver.</p>
<p>The good news: there is a way forward. Identity and Access Management (IAM), when coupled with API infrastructure, turns fragile endpoints into robust platforms. Treat APIs as real products with documentation, developer portals, and self-service onboarding, and adoption becomes a growth engine rather than a governance problem. IAM ensures every transaction, partner integration, and mobile app remains under control, even when your ecosystem starts to resemble a small country.</p>
<p>In this webinar, you will hear from three perspectives:</p>
<ul type="disc">
<li><strong>Alexei Balaganski</strong>, Lead Analyst at KuppingerCole, will set the stage with market dynamics, emerging security trends, and why &ldquo;just exposing APIs&rdquo; is not a strategy.</li>
<li><strong>Jacob Ideskog</strong>, CTO at Curity, will explain how modern identity solutions enable secure and scalable API adoption, sharing best practices such as continuous authorization, passwordless authentication, and verifiable credentials.</li>
<li><strong>Elisabeth Falck</strong>, Head of Digital Business Enablers at If P&amp;C Insurance, will share first-hand insights on how her organization successfully turned APIs into a true platform strategy.</li>
</ul>
<p>This webinar is designed for IT leaders, architects, security professionals, and developers who want to build secure, scalable, and business-driven API platforms, and who are ready to move beyond the myth that &ldquo;just publish an API&rdquo; is enough.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/endpoints-to-business-products"><img src="https://www.kuppingercole.com//videothumb/endpoints-to-business-products/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Charlene Spasic</dc:creator>			<pubDate>Thu, 13 Nov 2025 17:15:33 +0100</pubDate>
			<title><![CDATA[IAM Specialists’ Competitive Edge in an Evolving Cybersecurity Landscape]]></title>
			<link>https://www.kuppingercole.com/blog/spasic/iam-specialists-competitive-edge-in-an-evolving-cybersecurity-landscape</link>
			<guid>https://www.kuppingercole.com/blog/spasic/iam-specialists-competitive-edge-in-an-evolving-cybersecurity-landscape</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Charlene Spasic</a></p><p>The cybersecurity services market continues to evolve, driven by technology advancements, the emergence of new specialist providers, and consolidation among major players. KuppingerCole Analysts&rsquo; Research shows that the role of pure-play Identity and Access Management (IAM) specialists continues to adapt, as they navigate an evolving market shaped by both consolidation and diversification.</p>
<h2>Two Disciplines, One Objective</h2>
<p>IAM and cybersecurity share the same objective: protecting digital assets. Yet they differ in focus.</p>
<p>Cybersecurity services center primarily around protecting systems against threats and managing security incidents, typically through highly standardized processes and methodologies, utilizing technologies such as SIEM and XDR in the SOC.</p>
<p>IAM services, in contrast, primarily focus on the management of identities, related user accounts, and access entitlements. IAM is closely tied to business processes and governance, integrating deeply with HR systems, enterprise applications, and compliance frameworks, to enable secure access for everyone and everything to every service and application.</p>
<p>This deep integration with business processes and enterprise applications has kept IAM a distinct discipline within the broader security ecosystem. While cybersecurity service providers have expanded into identity-related service offerings, a distinction remains between standardized services and bespoke services that are tailored to the specific needs of individual enterprises. The more comprehensive aspects of enterprise identity governance and lifecycle components continue to rely on specialists&rsquo; domain expertise that is typically built over years of working in this field.</p>
<h2>Complexity as a Differentiator</h2>
<p>The complexity of IAM continues to create demand for specialized expertise. Enterprise IAM programs often require onboarding large numbers of systems, documenting and redefining application-level access models, and aligning controls with regulatory requirements such as DORA (EU Digital Operations Resilience Act), NIS2 (Network and Information Security Directive 2), or SOX (Sarbanes-Oxley Act).</p>
<p>Delivering these programs involves close collaboration with business stakeholders and a nuanced understanding of regional and operational context. Large enterprises often face differences across subsidiaries, countries, and regulatory environments. These elements cannot easily be standardized or offshored.</p>
<p>Global system integrators and managed security service providers commonly operate with centralized delivery models designed for efficiency and scale. IAM implementations, however, tend to be more bespoke, reflecting each organization&rsquo;s business and technical environment. This distinction helps explain why generalist cybersecurity providers still rely on specialized IAM partners for implementation and operational support.</p>
<h2>An Evolving Market creates Opportunities</h2>
<p>The identity and cybersecurity markets are continuously evolving, shaped by both consolidation and diversification. On one hand, platform vendors are expanding their portfolios through acquisitions, for example Palo Alto Networks&rsquo; move into identity security through its (in-progress) acquisition of CyberArk.</p>
<p>At the same time diversification continues as new vendors and start-ups emerge in areas such as Non-human Identity Management (NHI Management), Identity Visibility and Intelligence Platforms (IVIP), Identity Threat Detection and Response (ITDR), and many more. These developments increase the overall complexity of the ecosystem.</p>
<p>Organizations need experienced system integrators who can maintain control over identities and access entitlements across diverse architectures and governance models. For IAM specialists, this development presents an opportunity: as the environment becomes more complex, market entry barriers for generalist service providers rise, further reinforcing the value of deep specialized expertise.</p>
<h2>The Emerging Bridge: Identity Threat Detection &amp; Response (ITDR)</h2>
<p>ITDR has emerged as a logical connection between IAM and Cybersecurity. Unlike Extended Detection and Response (XDR), which focuses on event correlation and anomaly detection, ITDR requires a higher level of specialization. It integrates identity signals and telemetry with contextual information about entitlements, roles, and even business processes to detect credential misuse, privilege abuse, and unusual access behavior.</p>
<p>For IAM specialists, this represents a natural extension into cybersecurity operations while remaining close to their core domain. Furthermore, ITDR provides a way to meet customer expectations for continuous monitoring and identity-centric security operations</p>
<p>By combining IAM&rsquo;s understanding of users and entitlements with real-time threat visibility, ITDR connects access control with incident detection and response, effectively linking identity management with security operations.</p>
<h2>IAM Service Specialization remains Attractive</h2>
<p>Our research indicates that IAM-focused providers continue to hold a strong, defensible position in the market. As evolution shapes the broader cybersecurity landscape, identity-focused system integrators and service providers stand out for their unique position in the identity security services market. Various factors underpin this position:</p>
<ol>
<li><strong>Regulatory alignment</strong>: Organizations in highly regulated industries prefer partners who understand regional compliance frameworks and audit requirements. Knowledge of regulations helps ensure that identity solutions meet legal and business needs.</li>
<li><strong>Local and regional presence: </strong>Customers value partners who understand local and regional conditions, language, and influencing factors, such as local regulations, as well as the ability to collaborate on-site when needed. This proximity builds mutual understanding, and enables faster, more effective project execution.</li>
<li><strong>Vendor specialization: </strong>IAM system integrators differentiate themselves through deep experience and technical expertise with selected vendors and their complex solutions, supported by strong integration capabilities across platforms.</li>
<li><strong>Skills shortage:</strong> The limited global pool of experienced IAM professionals continues to drive demand for specialized expertise, reinforcing the market relevance and defensibility of established IAM specialists.</li>
</ol>
<p>These factors can create lasting client relationships and recurring service models. IAM solutions are typically tailored to the needs of each organization and include client-specific customization, which makes standardized and scalable managed services difficult to realize. Still, long-running implementation projects and continuous operational support naturally foster longer-term customer relationships and sustained revenue streams.</p>
<h2>Outlook: Defensibility in an Evolving Market</h2>
<p>The relationship between identity and cybersecurity is close. As organizations move toward identity-centric security architectures, the boundaries between these disciplines will continue to blur.</p>
<p>Despite this evolution, IAM specialists are likely to remain well positioned. The growing complexity of identity environments, driven by developments such as Policy-Based Access Management (PBAM), Identity Threat Detection &amp; Response (ITDR), and Non-Human Identity (NHI) Management, continues to require deep domain expertise that might not easily be standardized or automated. Regulatory and geopolitical factors, including EU-Sovereignty trends and data residency requirements, further reinforce the value of regional knowledge and delivery expertise.</p>
<p>As identity is moving towards becoming the control point for access and risk-based decision-making, IAM specialists have an opportunity to shape what identity-security looks like in practice. The future lies not in being absorbed into the larger ecosystem, but in making the ecosystem function by connecting its many parts through identity.</p>							]]></description>
		</item>
				<item>
						<pubDate>Thu, 13 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Separating Signal From Noise in Fraud Reduction Intelligence Platforms for eCommerce]]></title>
			<link>https://www.kuppingercole.com/watch/fraud-in-digital-commerce</link>
			<guid>https://www.kuppingercole.com/watch/fraud-in-digital-commerce</guid>
			<description><![CDATA[ <p>Fraud in digital commerce is a systemic challenge reshaping how businesses operate online. From synthetic identities engineered with AI to bot-driven abuse at scale, attackers exploit weaknesses faster than enterprises can redesign defenses. The result is a continuous erosion of trust that threatens the foundation of digital marketplaces.<br /> <br />Technology has reached a point where prevention must be as dynamic as the threat itself. Modern Fraud Reduction Intelligence Platforms (FRIP) aggregate behavioral analytics, device and credential intelligence, biometrics and bot detection into adaptive ecosystems. The question is no longer whether to deploy these tools, but which approaches deliver real impact and which simply add noise.<br /> <br />John Tolbert, Director of Cybersecurity Research at KuppingerCole Analysts, will present the findings of the 2025 Leadership Compass on FRIP for eCommerce. He will analyze the failures of traditional defenses, highlight key innovation and provide an unfiltered comparison of vendors across leadership categories. His presentation will challenge assumptions and uncover the realities behind marketing claims.<br /><br /></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/fraud-in-digital-commerce"><img src="https://www.kuppingercole.com//videothumb/fraud-in-digital-commerce/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Wed, 12 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Mastering Cyber Resilience with ThreatLocker: How to Stay Secure During the Holidays]]></title>
			<link>https://www.kuppingercole.com/watch/videocast-threatlocker-secure-holidays</link>
			<guid>https://www.kuppingercole.com/watch/videocast-threatlocker-secure-holidays</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">The holiday season might be the most wonderful time of the year&mdash;but it&rsquo;s also prime time for cybercriminals. In this Videocast episode, Warwick Ashford talks with Danny Jenkins, CEO and co-founder of ThreatLocker, about why attacks spike between November and December and what companies can do to stay protected.</p>
<p>They unpack:</p>
<p>✅ Why cyberattacks surge during holidays<br />✅ How to close your organization&rsquo;s biggest security gaps<br />✅ The importance of automated responses and real-time monitoring<br />✅ Why good backups (and tested restores!) still matter<br />✅ How a &ldquo;cyber health check&rdquo; can save your business from disaster</p>
<p>📈 Whether you&rsquo;re a security professional or a business leader, these insights will help you strengthen your defenses during the holidays and beyond.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/videocast-threatlocker-secure-holidays"><img src="https://www.kuppingercole.com//videothumb/videocast-threatlocker-secure-holidays/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Tue, 11 Nov 2025 15:13:55 +0100</pubDate>
			<title><![CDATA[Dec 16, 2025: Securing Your Organization Against AI-Driven Identity Threats]]></title>
			<link>https://www.kuppingercole.com/events/autonomous-ai-agents</link>
			<guid>https://www.kuppingercole.com/events/autonomous-ai-agents</guid>
			<description><![CDATA[ AI is no longer just a supporting tool — it’s becoming a semi-autonomous actor. AI agents are now automatically accessing systems, interacting with data, making decisions, and taking actions with little or no human interaction. But, as agentic AI adoption accelerates, identity and access management related challenges become critical. Misbehaving AI agents can do as much or more damage as individual human “agents”.							]]></description>
		</item>
				<item>
						<pubDate>Tue, 11 Nov 2025 14:52:22 +0100</pubDate>
			<title><![CDATA[Dec 09, 2025: Your 2026 Password Wake-Up Call: Breaches, AI, and What Comes Next]]></title>
			<link>https://www.kuppingercole.com/events/password-wake-up-call</link>
			<guid>https://www.kuppingercole.com/events/password-wake-up-call</guid>
			<description><![CDATA[ As 2026 approaches, credential-based attacks are accelerating faster than ever. AI-generated passwords, massive breach datasets, and automated credential-stuffing tools are redefining how attackers operate and exposing the limits of traditional password policies. Complexity and rotation rules alone can no longer keep pace with the speed at which credentials are stolen, reused, and evolved through AI. Attackers now generate near-infinite password variants, while many organizations still rely on outdated controls that were never designed for this level of automation.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 10 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[IPSIE Explained: Secure & Interoperable Identity]]></title>
			<link>https://www.kuppingercole.com/watch/ipsie-explained</link>
			<guid>https://www.kuppingercole.com/watch/ipsie-explained</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">The fragmentation of enterprise identity systems is creating real security risks but IPSIE is here to simplify and standardize.</p>
<p>In this episode, Matthias Reinwarth and Warwick Ashford explore <strong>IPSIE (Interoperability Profiling for Secure Identity in the Enterprise)</strong>, how it improves interoperability, enforces secure defaults, and provides measurable maturity levels for enterprise identity management.</p>
<p><strong>Key Topics Covered:</strong></p>
<p>✅ What IPSIE is and why it matters for enterprise identity 🧠<br />✅ How fragmentation of SaaS and cloud identity systems increases risk<br />✅ Opinionated profiles and secure, consistent standard implementation<br />✅ Maturity levels for session lifecycle, account lifecycle, and entitlements<br />✅ How IPSIE fits into the broader Identity Fabric strategy<br />✅ Current limitations: focus on human identities and next steps for non-human accounts</p>
<p><strong>IPSIE doesn&rsquo;t reinvent identity standards, it helps organizations implement what they already have consistently and securely, creating a foundation for stronger enterprise security.</strong></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/ipsie-explained"><img src="https://www.kuppingercole.com//videothumb/ipsie-explained/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 07 Nov 2025 14:56:07 +0100</pubDate>
			<title><![CDATA[Dec 11, 2025: From Identity Chaos to Cyber-Security Maturity - Ein Framework für messbare Sicherheit]]></title>
			<link>https://www.kuppingercole.com/events/identity-chaos-to-cyber-maturity</link>
			<guid>https://www.kuppingercole.com/events/identity-chaos-to-cyber-maturity</guid>
			<description><![CDATA[ Viele Unternehmen investieren massiv in Security – aber kaum jemand kann wirklich sagen, wie reif die eigene Organisation ist. IAM und Cyber-Security werden oft getrennt betrachtet, obwohl gerade ihre Schnittmenge über die tatsächliche Resilienz entscheidet.							]]></description>
		</item>
				<item>
			<dc:creator>Alexei Balaganski</dc:creator>			<pubDate>Fri, 07 Nov 2025 12:00:00 +0100</pubDate>
			<title><![CDATA[Winning the AI Race Without Building the Engine: Lessons from Oracle AI World]]></title>
			<link>https://www.kuppingercole.com/blog/balaganski/lessons-from-oracle-ai-world</link>
			<guid>https://www.kuppingercole.com/blog/balaganski/lessons-from-oracle-ai-world</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alexei Balaganski</a></p><p>Once again, I recently found myself in Las Vegas attending Oracle&rsquo;s flagship conference, now rebranded as <strong>Oracle AI World</strong>. The new name alone invites a debate. Was it a bold statement of intent or simply a sign that the world&rsquo;s AI fever has reached its final stage? After all, recent studies suggest that the majority of corporate AI initiatives never make it past the pilot phase, and hype fatigue is already setting in across many businesses. Oracle, interestingly, does not even build its own AI models. So why double down on this branding so aggressively?</p>
<h2>From Cloud to Context: Oracle&rsquo;s Grand AI Vision</h2>
<p>That question lingered with me as I remembered my earlier visit to the Red Bull Racing factory in England (incidentally, the team is currently competing as <i>Oracle Red Bull Racing</i><strong>, </strong>but my visit wasn&rsquo;t related to that fact at all). I&rsquo;m not a Formula 1 enthusiast by any measure, but that experience was a revelation. The success of a race, I learned, isn&rsquo;t determined solely by having the best driver or the most powerful engine. Behind every victory lies a huge ecosystem extending way beyond their HQ in Milton Keynes: engineers, data analysts, designers, pit crews, and hundreds of other specialists working in perfect sync.</p>
<p>And the team doesn&rsquo;t even manufacture its engines, yet it wins because it excels at orchestrating every other part of the system. That, I realized, was precisely what Oracle was trying to say with its new AI story.</p>
<p>As usual, Larry Ellison&rsquo;s keynote dominated the entire event and set the tone for many discussions. It was long, visionary, and occasionally meandering, but behind the surface was a surprisingly strong argument. Ellison believes that the next frontier of AI isn&rsquo;t model creation, but data contextualization. The companies building massive language models may make headlines, but the real value lies in connecting those models to the right data: private, high-value, business-critical enterprise information.</p>
<p>That is where Oracle comes into the competition. Most of the world&rsquo;s critical data already lives in Oracle databases, and the company&rsquo;s mission now is to make that data accessible to AI models without ever losing control of it. For the rest of the world&rsquo;s enterprise data, the company is now offering an open, standard-based data platform to bring it into a single, governed foundation.</p>
<p>Rather than entering the overcrowded race to build yet another large model, Oracle is betting that the real winners will be those who provide safe access to intelligence, allowing any model to reason on enterprise data while preserving privacy, sovereignty, and compliance.</p>
<h2>Oracle AI Database: Where Data and Intelligence Meet</h2>
<p>At the heart of this strategy is the new <strong>Oracle AI Database 26ai</strong>, which represents a fundamental architectural principle for the company. Rather than treating AI as an external workload, Oracle now embeds AI capabilities directly into the database engine. This eliminates the need to move sensitive data between systems, reducing latency and exposure while all security and access controls remain consistent at the data layer.</p>
<p>A central new feature, <strong>AI Vector Search</strong>, enables semantic understanding and similarity search across documents, images, and structured data. Unified retrieval across relational and vector data using familiar SQL allows enterprises to use techniques such as retrieval-augmented generation (RAG), where large language models can query the database for precise, contextual information before generating responses.</p>
<p>Oracle has also introduced <strong>in-database AI agents</strong>, autonomous components capable of executing reasoning tasks natively within the database, inheriting its transactionality, governance, and auditability. Specialized AI assistants for management, diagnostics, security, and knowledge retrieval make the database more accessible to both DBAs and less technically inclined users.</p>
<p>Security, privacy, and compliance are deeply woven into this architecture. The database now supports Trusted Data APIs to strictly control what information AI models can access, significantly reducing the risk of unintentional data leaks or prompt injections. AI-specific controls limit what large models can consume or produce and prevent sensitive data from leaving its controlled environment. Oracle has even gone a step further by implementing NIST-approved <strong>quantum-resistant algorithms</strong>, giving the platform cryptographic agility against emerging post-quantum threats.</p>
<h2>The Lakehouse for the Age of Open AI</h2>
<p>One of Oracle&rsquo;s most substantial announcements at AI World was the new <strong>Autonomous AI Lakehouse</strong>, designed to bring a new level of openness and intelligence into the company&rsquo;s data architecture. Integrating natively the open <strong>Apache Iceberg</strong> data format into Autonomous AI Database makes Oracle&rsquo;s analytical and AI capabilities fully interoperable with the broader ecosystem, allowing data to be shared across Databricks, Snowflake, and other Iceberg-compatible platforms without conversion or lock-in.</p>
<p>The system automatically caches frequently accessed data in Oracle Exadata flash storage while maintaining transactional consistency, bridging the gap between data lakes and traditional databases. Existing users of Oracle Autonomous Data Warehouse are automatically upgraded into AI Lakehouse without any effort.</p>
<p>A Federated Catalog of Catalogs adds another layer of openness, enabling seamless discovery and query federation across multiple Iceberg catalogs. Finally, integrated GoldenGate replication supports real-time movement of operational data into open AI Lakehouse formats so that analytics and AI workloads always operate on current information.</p>
<p>Altogether, the Autonomous AI Lakehouse represents Oracle&rsquo;s pragmatic shift toward open, federated data infrastructure that treats interoperability not as a concession but as a competitive advantage. Further demonstrating openness, Autonomous AI Lake House is a multicloud lakehouse to the fullest extent, available on OCI and within AWS, Azure, and Google Cloud data centers.</p>
<h2>Building a Unified Foundation for Enterprise AI</h2>
<p>Complementing its Oracle AI Database and Autonomous AI Lakehouse innovations, Oracle also unveiled the <strong>Oracle AI Data Platform</strong>: a unified environment for developing, deploying, and operating AI and analytics workloads at scale. While the Autonomous AI Lakehouse focuses on open data architecture on any cloud, the AI Data Platform brings Autonomous AI Lakehouse, GenAI models, Open Source engines and frameworks together into a cohesive, enterprise-ready foundation built on OCI and designed to work with data from anywhere.</p>
<p>The platform consolidates structured, unstructured, historical, and real-time data into a single governed environment. A <strong>Unified Catalog</strong> manages all data assets, AI models, and agents across the organization, providing consistent security, lineage, and compliance. Built-in support for open-source engines like Spark and Flink allows teams to combine Oracle&rsquo;s high-performance Autonomous AI Database with widely used data processing frameworks.</p>
<p>A <strong>Developer Workbench</strong> provides a single workspace for data engineering, model training, and agent development, with AI-assisted notebooks supporting multiple languages and seamless integration with Git for version control. The Workbench also includes no-code and pro-code experiences for defining and deploying intelligent agents that can orchestrate data workflows, trigger business processes, and deliver insights through natural-language interfaces.&nbsp;</p>
<p>Next year, the <strong>Agent Hub</strong> will offer a unified conversational interface for business users across departments and systems. It abstracts the complexity of navigating many agents, interprets requests, invokes the right agents, presents recommendations and enables immediate action. Together, these layers form an end-to-end environment for turning enterprise data into trusted, actionable AI-powered intelligence, open in architecture but tightly integrated in governance and security.</p>
<h2>The Real AI Race: Agility Over Size</h2>
<p>I believe it is increasingly clear that the industry&rsquo;s obsession with comparing model sizes and parameter counts is becoming irrelevant. The pace of AI innovation is so ferocious that the &ldquo;largest model in the world&rdquo; rarely stays on top for more than a few months. Eventually, enterprises will shift their attention to other priorities: sustainability, efficiency, sovereignty, and, above all, adaptability. The ability to reconfigure architectures, replace components, and scale responsibly will define the next generation of AI leaders.</p>
<p>This is where Oracle&rsquo;s strategy feels pragmatic. By focusing on AI agility rather than model supremacy, the company is investing in an ecosystem that can evolve as fast as the technology itself. Oracle doesn&rsquo;t need to build its own AI models; it needs to integrate the best components from an open ecosystem, tune the infrastructure, and design it so that everything, from the cloud to the data layer, is optimized to deliver performance, reliability, and trust.</p>
<p>Whether we are still climbing the &ldquo;peak of inflated expectations&rdquo; or already sliding down the &ldquo;trough of disillusionment,&rdquo; one thing is certain: AI will continue to reshape how data is managed, protected, and monetized. When the dust settles, enterprises will rediscover that intelligence without integrity is a liability, and that agility, openness, and trust will matter far more than model size or GPU count.</p>
<p>In his closing statement, Ellison said, &ldquo;If AWS won the cloud wars by democratizing compute, Oracle now aims to win the AI wars by democratizing intelligence.&rdquo; It&rsquo;s an ambitious claim, but also a realistic one. The company isn&rsquo;t trying to build the brain of AI, but the circulatory system that keeps it alive. And perhaps that&rsquo;s the real lesson from Oracle AI World: you don&rsquo;t have to build the engine to win the race. Instead, you need to design the track where intelligence runs best.</p>							]]></description>
		</item>
				<item>
						<pubDate>Fri, 07 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Closing the Gaps in Zero Trust]]></title>
			<link>https://www.kuppingercole.com/watch/beyond-zero-trust</link>
			<guid>https://www.kuppingercole.com/watch/beyond-zero-trust</guid>
			<description><![CDATA[ <p>Zero Trust promised to secure everything, yet attackers still get through. IAM validates only the login, SOCs watch devices, not humans. Phishing-resistant bypasses, session hijacking, and insider threats thrive in this blind spot, leaving enterprises with a false sense of security. The human endpoint remains the weakest link.</p>
<p>Continuous authentication and ITDR flip the model: from static checkpoints to continuous proof of identity and intent. Behavioral biometrics, context-aware access, and identity telemetry expose compromised users just like compromised devices. The silos must break. IAM and SOC must unite around the human.<br /><br />Alejandro Leal, Senior Analyst at KuppingerCole will provide a strategic perspective on the shortcomings of traditional IAM and Zero Trust architectures. He will highlight how fragmented stacks leave the human endpoint unprotected, discuss the role of continuous authentication and ITDR in mitigating this risk, and share best practices for integrating identity intelligence into SOC operations.<br /><br />Alex Coco, Global Solutions Architect at Veridium will explain how VeridiumID addresses these challenges with a unified solution. He will illustrate how behavioral biometrics, continuous checks, and human endpoint detection create actionable visibility for both IAM and SOC teams. Concrete use cases will demonstrate how enterprises can strengthen assurance without increasing friction for users.<br /><br />This webinar is ideal for security leaders, SOC and IAM professionals, and IT decision-makers who want to close Zero Trust gaps and protect the human endpoint with continuous authentication and ITDR. As phishing-resistant bypasses, session hijacking, and insider threats continue to evade static defenses, organizations need to evolve from one-time authentication to continuous proof of identity and intent. By uniting IAM and SOC practices through continuous authentication, behavioral biometrics, and ITDR, participants will learn how to detect compromised users in real time and close the critical blind spot attackers exploit.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/beyond-zero-trust"><img src="https://www.kuppingercole.com//videothumb/beyond-zero-trust/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Thu, 06 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Why Static Credentials Are Your Fastest-Growing Attack Surface]]></title>
			<link>https://www.kuppingercole.com/watch/static-secrets</link>
			<guid>https://www.kuppingercole.com/watch/static-secrets</guid>
			<description><![CDATA[ <p>Static secrets - passwords, API keys, tokens - are relics of the past. In AI-powered environments, they are more than just inconvenient - they are dangerous. Hardcoded credentials and endless key rotations create sprawling attack surfaces and leave organizations clinging to outdated security practices that can&rsquo;t survive the speed and scale of AI workloads.<br /> <br /> The alternative is radical yet inevitable: go Secretless. By eliminating static secrets and replacing them with dynamic, just-in-time access tied to machine identities, organizations can finally close security gaps that hackers exploit daily. Secretless authentication enforces Zero Trust and Least Privilege in ways that static secrets never could, giving AI workloads security that matches their velocity.<br /> <br /> Martin Kuppinger, Co-Founder &amp; Principal Analyst at KuppingerCole will explain why static credentials are a dead end. He will challenge conventional wisdom around secrets management, spotlight the growing risks of credential sprawl, and map out how the industry is moving toward identity-first architectures where Secretless is not optional but mandatory.</p>
<p>Oded Hareven, CEO &amp; Co-Founder at Akeyless will show how enterprises are already making this leap. He will present how Akeyless&rsquo; SecretlessAI solution dismantles the dependency on static secrets, enabling organizations to cut risk, simplify operations, and secure AI workloads without slowing down innovation. Oded will share real-world insights from enterprises that dared to go Secretless.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/static-secrets"><img src="https://www.kuppingercole.com//videothumb/static-secrets/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Matthew Gardiner</dc:creator>			<pubDate>Wed, 05 Nov 2025 15:28:05 +0100</pubDate>
			<title><![CDATA[SOAR Rebooted: Why Security Automation’s Moment Is Now]]></title>
			<link>https://www.kuppingercole.com/blog/gardiner/soar-rebooted-why-security-automations-moment-is-now</link>
			<guid>https://www.kuppingercole.com/blog/gardiner/soar-rebooted-why-security-automations-moment-is-now</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Matthew Gardiner</a></p><p>SOC teams are drowning in events and alerts coming from their various underlying threat and vulnerability detection systems. In many SOCs this volume far outstrips their triage and investigative capacity. Many surveys show that alerts are so numerous that the majority are strategically ignored to stop infinite queue growth. One <a href="https://www.msspalert.com/news/mssp-market-news-survey-shows-62-of-soc-alerts-are-ignored" target="_blank">report</a>&nbsp;found that SOC teams receive 3,832 alerts per day on average, with 62% of those ignored. That&rsquo;s a key operational gap SOAR is meant to close.</p>
<h2>What SOAR is in 2025</h2>
<p>SOAR&mdash;Security Orchestration, Automation, and Response&mdash;transforms detections to understanding, decisions, and actions. SOAR systems ingest events and alerts, enriches them with context, supports analysis, orchestrates cross-tool/cross-team workflows, and drives incident response to resolution. The SOAR category of security solutions emerged in the 2014/2015 timeframe and has worn many labels along the way (TRO, IRAP, CRA, SecOps automation, and others) but I&rsquo;ll use SOAR throughout for clarity.</p>
<h2>Why SOAR remains a high priority</h2>
<p>You can&rsquo;t scale a 24&times;7 SOC function with headcount alone; even well-staffed enterprises run out of people. For enterprises with more than 5K employees, a &ldquo;typical&rdquo; in-house SOC has approximately 11-25 people already. It is not reasonable to expect to get more people to throw at this problem.</p>
<p>In today&rsquo;s enterprise, made up of on-premises, cloud and SaaS applications, remote and hybrid staff, thousands or even millions of identities, and the recent explosive rise of AI, this growing attack surface keeps pushing threats and thus security events and alerts up.</p>
<p>The result is that defenders need smart(er) automation to keep pace while also improving detection and response efficacy. In my conversations, I hear the same goals: shrink MTTR, cut false positives while not increasing false negatives, keep approvals and audit trails tight, and make playbooks creatable and maintainable by more than one &ldquo;hero&rdquo; automation engineer. Enterprises confirm they simply &ldquo;can&rsquo;t throw people at the problem&rdquo; anymore.</p>
<p>The SOAR market has matured over these past 10 years. There are now dozens of offerings and vendor go-to-market strategies, reflecting the age-old buyer decision conundrum of &ldquo;best of breed&rdquo; or &ldquo;integrated security platform&rdquo;. But there is also an ongoing twist to this historically binary choice, with some vendors (and independent managed service providers) providing outsourced SOC services as managed detection and response (MDR) services. With some SOAR/MDR providers also enabling 3rd-party MDR providers with their SOAR and broader security stack. The bottom line is that there are many automation solution options from which enterprises can choose!</p>
<p>Thus, a key enterprise buying decision for 2025 and beyond, select a SOAR that is:</p>
<ul>
<li>Best-of-breed</li>
<li>Part of a broader security platform</li>
<li>Delivered as part of an outsourced, SOAR-enabled MDR service?</li>
</ul>
<p>This is one question I plan to help answer as part of my in-process research.</p>
<h2>The basic capabilities of SOAR have stabilized&mdash;but how they provide them is evolving</h2>
<p>Across all SOAR products, three pillars of core capabilities show up consistently:</p>
<ul>
<li>Event/alert collection, correlation, enrichment, and analysis</li>
<li>Orchestration and automation across security and IT systems and organizations</li>
<li>Case management and incident response/mitigation (both automated and human-in-the-loop)</li>
</ul>
<p>What is changing is how teams deliver these capabilities, as AI quickly enters the SOAR realm.</p>
<h2>AI in SOAR: assistive now, more autonomous later?</h2>
<p>On the defender side, chat interfaces and task-specific agents are becoming common tools for analysts and responders. What will AI ultimately enable? Perhaps faster enrichment, triage, and summarization, smarter next-step suggestions, more reliable alert prioritization, and safer automation with/without human involvement. But how to do this safely with non-deterministic, black box AI systems?</p>
<h2>What I&rsquo;m researching now (and how to weigh in)</h2>
<p>Over the coming months, I&rsquo;m building an updated KuppingerCole Leadership Compass on SOAR to publish in early 2026. In this Leadership Compass, I will assess:</p>
<ul>
<li>The operating models that work and for whom (standalone, embedded, hybrid, MDR/outsourced led)</li>
<li>How playbook and workflow authoring and maintenance scales (versioning, testing, drift control)</li>
<li>Integration coverage, functionality, and ease of expansion.</li>
<li>Evidence, auditability, and reporting that prove improvement and value</li>
<li>Where AI helps today&mdash;and how far down the AI-based automation road SOCs can go in the near future.</li>
</ul>
<p>If you have a SOAR product, customer stories, hard metrics, or a contrarian view, I&rsquo;d love to hear it. SOAR vendors with a dog in this fight: <a href="https://www.kuppingercole.com/researchplan/leadership-compass-soar-2026" target="_blank">please reach out and take part</a>.</p>
<p><em><a href="https://www.linkedin.com/in/jmatthew-gardiner/" target="_blank">Matthew Gardiner</a> is a Fellow Analyst at KuppingerCole covering security operations, identity, and the intersection of AI and automation. This article kicks off a series leading to the 2026 Leadership Compass on SOAR.</em></p>							]]></description>
		</item>
				<item>
						<pubDate>Wed, 05 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Fireside Chat: How OpenAI and Axel Springer Made Identity a Growth Engine]]></title>
			<link>https://www.kuppingercole.com/watch/identity-growth-engine</link>
			<guid>https://www.kuppingercole.com/watch/identity-growth-engine</guid>
			<description><![CDATA[ <p class="pf0"><span class="cf0">Customer Identity and Access Management (CIAM) has outgrown its role as a basic security layer. Yet many enterprises are still weighed down by legacy IAM systems that can&rsquo;t scale, lock them into rigid architectures, and slow down product innovation</span><span class="cf1">&mdash;ultimately costing users, revenue, and competitive edge.</span></p>
<p class="pf0"><span class="cf1"></span><span class="cf1">Composable, cloud-native CIAM turns identity from a bottleneck into a growth driver. Modular identity services let organizations adapt quickly to new business models, support internet-scale demand, and align identity with evolving compliance and technology needs&mdash;all while future-proofing for AI-driven and agentic use cases.</span></p>
<p class="pf0"><span class="cf1"></span><span class="cf1">In this session, John Tolbert, Director of Research and Lead Analyst at </span><span class="cf1">KuppingerCole</span><span class="cf1">, will chart the evolution of CIAM as a business enabler. He&rsquo;ll show how composable architectures give enterprises the flexibility to adapt to increasing complexity&mdash;across business requirements, compliance, and tech stacks&mdash;and why forward-looking organizations are using identity to prepare for the next wave of innovation.</span></p>
<p class="pf0"><span class="cf1"></span><span class="cf1">Jeff Hickman, Head of Customer Engineering at </span><span class="cf1">Ory</span><span class="cf1">, will share how </span><span class="cf1">OpenAI</span><span class="cf1"> scaled identity to hundreds of millions of weekly users and how Axel Springer achieved a 10x jump in registrations. He&rsquo;ll also give practical guidance on modernizing CIAM with </span><span class="cf1">Ory&rsquo;s</span><span class="cf1"> ecosystem and deployment models&mdash;enabling enterprises to stay agile and aligned with long-term growth.</span></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/identity-growth-engine"><img src="https://www.kuppingercole.com//videothumb/identity-growth-engine/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Alejandro Leal</dc:creator>			<pubDate>Mon, 03 Nov 2025 12:01:08 +0100</pubDate>
			<title><![CDATA[Identity Threat Detection and Response (ITDR)]]></title>
			<link>https://www.kuppingercole.com/research/lc81209/identity-threat-detection-and-response-itdr</link>
			<guid>https://www.kuppingercole.com/research/lc81209/identity-threat-detection-and-response-itdr</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alejandro Leal</a></p>This Leadership Compass explores the Identity Threat Detection and Response (ITDR) market. As digital identities have become the primary attack vector in modern cybersecurity incidents, ITDR has grown in importance as a complementary capability to traditional IAM. Effective ITDR solutions help organizations detect malicious activity involving identity systems and provide continuous discovery and visibility of identity assets. They also offer robust threat detection and accelerate investigations while supporting response and recovery efforts. This report analyzes the key players in the ITDR market in 2025, their technical capabilities and strategic direction, and provides practical guidance for organizations seeking to strengthen their identity defenses in the face of evolving threats.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 03 Nov 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Designing IAM for 2040: Orchestration, Signals, and Agility]]></title>
			<link>https://www.kuppingercole.com/watch/designing-iam-for-2040</link>
			<guid>https://www.kuppingercole.com/watch/designing-iam-for-2040</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">The future of <strong>Identity and Access Management (IAM)</strong> is already being built &mdash; but are we preparing for 2040?</p>
<p>In this episode, <strong>Matthias Reinwarth</strong> and <strong>Martin Kuppinger</strong> explore how organizations can design <strong>future-ready identity fabrics</strong>, avoid <strong>tool sprawl</strong>, and build the <strong>platformized IAM architectures</strong> needed to thrive in a fast-changing digital landscape.</p>
<p><strong>Key Topics Covered:</strong></p>
<p>✅ What the &ldquo;Identity Fabric 2040&rdquo; means for IAM strategies 🧠<br />✅ The rise of orchestration, signals &amp; API-first design<br />✅ Avoiding IAM tool sprawl and capability duplication<br />✅ Platformization vs. best-of-breed: what really works?<br />✅ Why outcome-driven IAM is the only sustainable approach<br />✅ How signals redefine authentication, authorization &amp; user experience</p>
<p>💡 <em>Your IAM decisions today shape the next 15 years. Are you building for 2040&mdash;or already falling behind?</em></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/designing-iam-for-2040"><img src="https://www.kuppingercole.com//videothumb/designing-iam-for-2040/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>John Tolbert</dc:creator>			<pubDate>Fri, 31 Oct 2025 08:52:39 +0100</pubDate>
			<title><![CDATA[Ory]]></title>
			<link>https://www.kuppingercole.com/research/ev81133/ory</link>
			<guid>https://www.kuppingercole.com/research/ev81133/ory</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">John Tolbert</a></p>This KuppingerCole Executive looks at the background and options available to IT managers and security strategists to manage Consumer Identity and Access Management. A technical review of the Ory platform is included.							]]></description>
		</item>
				<item>
						<pubDate>Fri, 31 Oct 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Halloween Cybersecurity Special: From Scare to Insight]]></title>
			<link>https://www.kuppingercole.com/watch/from-scare-to-insight</link>
			<guid>https://www.kuppingercole.com/watch/from-scare-to-insight</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">In this special <strong>Halloween edition</strong> of the <em>KuppingerCole Analyst Chat</em>, <strong>Matthias Reinwarth</strong> is joined by <strong>Jonathan Care</strong>, Lead Analyst at KuppingerCole Analysts, to explore one of the most talked-about cybersecurity stories of the year &mdash; the <strong>F5 supply chain incident</strong>.</p>
<p>The discussion highlights how even well-established organizations can become targets of sophisticated, long-term attacks &mdash; and what this means for the future of <strong>software supply chain security</strong>.</p>
<p>Together, Matthias and Jonathan examine how incidents like this can happen, what lessons can be learned across the industry, and how companies can strengthen resilience, transparency, and response capabilities in their own environments.</p>
<p><strong>Key topics covered:</strong></p>
<p>✅ Understanding the dynamics of modern supply chain attacks ⚠️<br />✅ Why detection and dwell time remain a major industry challenge<br />✅ The growing importance of vendor risk and software transparency<br />✅ Lessons learned for CISOs and IT leaders<br />✅ Practical measures to improve visibility and response<br />✅ Why collaboration and information sharing are key to resilience</p>
<p>🕸️ <strong>Even trusted systems can hide a few ghosts &mdash; are you ready to uncover yours?</strong></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/from-scare-to-insight"><img src="https://www.kuppingercole.com//videothumb/from-scare-to-insight/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 31 Oct 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[From Discovery to Remediation: The 2025 Landscape for Attack Surface Management]]></title>
			<link>https://www.kuppingercole.com/watch/attack-surface-management</link>
			<guid>https://www.kuppingercole.com/watch/attack-surface-management</guid>
			<description><![CDATA[ <p>Attack Surface Management (ASM) is a continuous process that involves identifying, assessing, and proactively securing an organization's assets to close security gaps before attackers can exploit them.</p>
<p>ASM includes four core areas: 1) External Attack Surface Management (EASM), which identifies internet-facing assets such as domains, IP addresses, and applications; 2) Cyber Asset Attack Surface Management (CAASM), which focuses on internal and external assets, as well as cloud resources and misconfigurations; 3) Third-Party Risk Management (TPRM), which examines supply chain risks inherited from vendors, partners, and subsidiaries; and 4) Digital Risk Protection (DRP), which tracks external threats, such as phishing domains, social media impersonation, leaked credentials, and brand abuse. Together, these capabilities provide security teams with an attacker's view of their environment and help them understand their vulnerabilities and prioritize issues proactively.</p>
<p>In 2025, ASM is no longer just about visibility. Organizations need solutions that provide context, prioritization, and remediation to stay ahead of emerging threats. This webinar explores why continuous, ownership-aware discovery is becoming a baseline requirement and how industry trends are pushing cybersecurity strategies toward risk-based, attacker-perspective approaches.</p>
<p><strong>Osman Celik, Research Analyst at KuppingerCole,</strong> will share key insights from the latest Leadership Compass on ASM. He will discuss how the market is evolving and what sets leaders in this field apart. Additionally, he will explain why risk mapping is becoming a key capability for vendors and how it contributes to effective remediation strategies.</p>
<p><strong>Rob Gurzeev, Co-Founder and CEO at CyCognito</strong>, will share the company&rsquo;s perspective as one of the leaders in the KuppingerCole Leadership Compass. He will outline how continuous, ownership-aware discovery helps close blind spots, why surface scans fall short, and how attacker-first strategies shape the future of ASM. He will also highlight why CyCognito is recognized as one of the most innovative vendors in the ASM market and demonstrate the capabilities that set it apart.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/attack-surface-management"><img src="https://www.kuppingercole.com//videothumb/attack-surface-management/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Matthias Reinwarth</dc:creator>			<pubDate>Thu, 30 Oct 2025 15:30:00 +0100</pubDate>
			<title><![CDATA[When AI Calls for Help: Why Context Still Beats Data]]></title>
			<link>https://www.kuppingercole.com/blog/reinwarth/when-ai-calls-for-help-why-context-still-beats-data</link>
			<guid>https://www.kuppingercole.com/blog/reinwarth/when-ai-calls-for-help-why-context-still-beats-data</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Matthias Reinwarth</a></p><p>If you&rsquo;ve ever chuckled at a meme about a &ldquo;stupid AI,&rdquo; you&rsquo;re not alone. They&rsquo;re everywhere - and most of them completely miss the point. What they usually show isn&rsquo;t the failure of artificial intelligence, but the failure of humans to give it the right guidance.</p>
<p>The real problem isn&rsquo;t that AI can&rsquo;t think; it&rsquo;s that we keep expecting it to.</p>
<h2>The illusion of intelligence without supervision</h2>
<p>Artificial intelligence remains a creature of its data and design. It&rsquo;s excellent at spotting anomalies - but has no clue what those anomalies actually mean. Take enterprise systems such as SAP: an AI might flag the spike of end-of-year transactions in finance as a suspicious deviation, while any human accountant would instantly recognize it as standard procedure.</p>
<p>This is precisely where today&rsquo;s Security Operations Centers (SOCs) reach their limits. AI systems are flooded with countless alerts and &ldquo;risk signals,&rdquo; often stripped of the context that gives them meaning. Correlation across systems is still far from perfect. As a result, it is (or should be) up to human analysts to fill in the blanks - adding the missing context, interpreting intent, and reconstructing what&rsquo;s really happening.</p>
<p>The challenge: until there is enough contextual understanding, increasing the degree of correlation may actually make things worse. It can lead to misleading results, simply because the growing volume of data makes it harder to extract meaning. And if only limited human feedback is available, AI will start to generalize everything in that narrow frame - interpreting unrelated signals as if they were, for instance, end-of-year financial activities - until the next wave of contextual learning comes along, such as operational changes during a summer factory shutdown. In essence, there is a widening gap between massive data volumes and scarce human feedback, a gap that cannot be bridged at scale.</p>
<p>In this environment, human analysts play a crucial role - not only by providing context, but by continuously refining and adjusting rules, integrating domain knowledge, and offering the qualitative insight that AI systems still lack. Over time, these efforts enable the models to deliver more meaningful and accurate responses. The outcome is not necessarily fewer human tasks, but more complex and more valuable ones, as they provide the understanding AI still depends on to make the right decisions.</p>
<p><img src="/pics/Bild114.png" alt="" /></p>
<p>To fix this, we don&rsquo;t need &ldquo;smarter&rdquo; AI. We need better-trained AI - systems that are not just fed with data but guided with context. Supervised learning, refined through ongoing human feedback, allows AI to slowly grasp why certain anomalies are harmless while others are worth an alarm. It&rsquo;s not the size of the dataset that determines success, but the depth of understanding built into it.</p>
<h2>The limits of shared learning in a world built on context</h2>
<p>Some argue that massive datasets - like those collected by large security vendors - will eventually solve this problem. That approach only works in areas where the data itself carries meaning, such as network telemetry or known threat patterns. Once business context enters the picture, everything changes - and it inevitably has to. The point is simple: the moment you want to work in a truly risk-based way, business context must become part of the equation.</p>
<p>Every enterprise has its own logic, processes, and operational rhythms. Much may look similar across organizations, yet the willingness to share business context quickly fades once questions of sensitivity arise. It is difficult to draw a clear line between what counts as generic context and what constitutes confidential, strategic, or competitive information that must remain internal. As a result, cross-enterprise AI learning - while effective in areas like network security - largely fails when it comes to domains shaped by business context.</p>
<h2>The human in the loop is here to stay</h2>
<p>The real takeaway is that AI does not - and will not - replace human expertise in domains that depend on understanding nuance, context, and intent. Its task is to learn continuously and, over time, to narrow the range of situations that still require human judgement. In security operations, for instance, AI should aim to eliminate false negatives, minimize false positives, and deliver only those alerts or events to analysts where human insight truly makes the difference.</p>
<p>Looking at this from a broader perspective, the myth of a &ldquo;fully automated workforce&rdquo; dissolves quickly. AI can execute rules, but it cannot create them without instruction. Future human jobs will therefore not vanish - they will evolve. One of their most valuable forms will be continuously teaching AI the complex rules of the real world- something only genuine, experience-based human expertise can provide - translating human expertise into structured knowledge that machines can actually use.</p>
<h2>When bad input meets bad output</h2>
<p>The many laughable AI-generated phishing and spam attempts flooding inboxes today are living proof of this. Contrary to many expectations, they aren&rsquo;t better or more convincing &ndash; they are just differently bad. And it hardly helps to counter bad AI from attackers with equally bad AI on the defenders&rsquo; side. The reason remains the same as before: poor training data, weak supervision, and a lack of domain-specific refinement - this time in the worlds of fraud and social engineering.</p>
<p>AI is only as intelligent as the human effort invested in shaping it. Until we stop treating it as an oracle and start treating it as an apprentice, the memes will keep writing themselves - and the real stupidity will remain entirely human.</p>							]]></description>
		</item>
				<item>
						<pubDate>Thu, 30 Oct 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Deepfakes, Trust & the Future of Identity | Identity-Centric Cybersecurity Impact Day Spotlight]]></title>
			<link>https://www.kuppingercole.com/watch/2025-iccid-speaker-spotlight-kashif-husain</link>
			<guid>https://www.kuppingercole.com/watch/2025-iccid-speaker-spotlight-kashif-husain</guid>
			<description><![CDATA[ <p><span>Identity is the new crown jewel of cybersecurity &mdash; and few know this better than Kashif Husain, Vice President, Information Security Officer at Nomura.</span></p>
<p><span>In this speaker spotlight, Kashif reveals why protecting identity means protecting everything &mdash; and how psychology, deepfakes, and synthetic identities are redefining what &ldquo;trust&rdquo; means in the digital age.</span></p>
<p><span>You&rsquo;ll learn:</span><br /><span>✅ Why identity is the &ldquo;crown jewel&rdquo; of security &mdash; and what happens when attackers steal it</span><br /><span>✅ The biggest identity challenge in global financial services today</span><br /><span>✅ How social engineering and psychology fuel the most effective cyberattacks</span><br /><span>✅ Why deepfakes and synthetic identities are the next major frontier in fraud</span><br /><span>✅ How small daily habits &mdash; not just technology &mdash; help build lasting digital trust</span></p>
<p><span>📌 Don&rsquo;t miss Kashif&rsquo;s session at Identity-Centric Cybersecurity Impact Day 2025, where he&rsquo;ll share how financial institutions like Nomura protect identity, combat emerging threats, and preserve trust in an AI-driven world.</span></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/2025-iccid-speaker-spotlight-kashif-husain"><img src="https://www.kuppingercole.com//videothumb/2025-iccid-speaker-spotlight-kashif-husain/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Thu, 30 Oct 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Breaking the Firewall: Why WAAP Defines the Next Era of Protection]]></title>
			<link>https://www.kuppingercole.com/watch/breaking-the-firewall</link>
			<guid>https://www.kuppingercole.com/watch/breaking-the-firewall</guid>
			<description><![CDATA[ <p>As web applications and APIs power everything from e-commerce to online banking, the need for advanced protection has never been greater. Traditional WAFs can no longer address the complexity of today&rsquo;s API-driven environments. This webinar will explore why WAAP has become the new standard for web application and API security. You will learn what WAAP is, why organizations are adopting it, and how it addresses critical challenges such as bot attacks, DDoS threats, and API vulnerabilities. We will also present findings from our recent Leadership Compass, including analysis of market leaders, innovative capabilities, and emerging trends. Join us to discover how organizations are leveraging WAAP to reduce risk, ensure resilience, and protect their systems.</p>
<p>Osman Celik, Research Analyst at KuppingerCole, will share insights from his latest Leadership Compass on WAAP and its growing importance in modern cybersecurity strategies. He will discuss the transition from WAF to WAAP, the essential capabilities, and the latest updates from the market. The session will also cover vendor differentiators and innovations shaping the WAAP market.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/breaking-the-firewall"><img src="https://www.kuppingercole.com//videothumb/breaking-the-firewall/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Alexei Balaganski</dc:creator>			<pubDate>Wed, 29 Oct 2025 12:59:51 +0100</pubDate>
			<title><![CDATA[Vom Perimeter zur Persona: Warum Datensicherheit heute mit der Identität beginnt]]></title>
			<link>https://www.kuppingercole.com/research/wp81134/vom-perimeter-zur-persona-warum-datensicherheit-heute-mit-der-identitaet-beginnt</link>
			<guid>https://www.kuppingercole.com/research/wp81134/vom-perimeter-zur-persona-warum-datensicherheit-heute-mit-der-identitaet-beginnt</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alexei Balaganski</a></p>Die Datensicherheit in Unternehmen beginnt heute nicht mehr am Netzwerkrand, sondern bei der Identität. Sensible Informationen sind über Clouds, SaaS- und KI-Umgebungen verteilt, sodass gefährdete Anmeldedaten zum primären Angriffspunkt werden. Durch die Integration von Erkennung, Klassifizierung und Datensicherheitsmanagement mit identitätsbasierter Durchsetzung, Automatisierung und KI werden geringstmögliche Zugriffsrechte, schnelle Re-aktion auf Vorfälle und Konformität ermöglicht. Varonis bietet eine einheitliche Plattform, um diesen identitätsbasierten Ansatz effektiv umzusetzen.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 29 Oct 2025 12:28:24 +0100</pubDate>
			<title><![CDATA[Dec 10, 2025: AIdentity’s Answer to MCP Server Incidents]]></title>
			<link>https://www.kuppingercole.com/events/ai-driven-agents</link>
			<guid>https://www.kuppingercole.com/events/ai-driven-agents</guid>
			<description><![CDATA[ Autonomous processes now run faster than our control systems. MCP servers now operate at machine speed linking tools, triggering actions, and making decisions faster than governance can react. The danger isn’t capability but control: when accountability trails automation, incidents become invisible until they detonate.							]]></description>
		</item>
				<item>
			<dc:creator>Mike Small</dc:creator>			<pubDate>Tue, 28 Oct 2025 15:00:00 +0100</pubDate>
			<title><![CDATA[Cyber Resilience]]></title>
			<link>https://www.kuppingercole.com/blog/small/cyber-resilience</link>
			<guid>https://www.kuppingercole.com/blog/small/cyber-resilience</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Mike Small</a></p><h2>How Organizations Bounce Back from Cyber Incidents</h2>
<p>&ldquo;<em>Everyone has a plan until they get punched in the face</em>.&rdquo; &mdash; Mike Tyson</p>
<p>The same is true for cyber incidents. Having a response plan is essential, but the real test comes when your organization is hit by a cyber-attack. Organizations that have invested in cyber resilience are the ones that stay standing when the punch lands.</p>
<p>In October the UK National Cyber Security Centre (NCSC) <a href="https://www.ncsc.gov.uk/collection/ncsc-annual-review-2025" target="_blank">published its annual report</a>. This makes for uncomfortable reading, reporting an increasing number of nationally significant cyber-attacks this year. These include attacks on the major retailers Marks &amp; Spencer (M&amp;S), and the Co-op Group, as well as the motor manufacturer Jaguar Land Rover (JLR) which have resulted in major disruptions and significant financial costs.</p>
<p><img src="/pics/Bild211.png" alt="" /></p>
<p>Most of the commentary around cyber incidents dwells on their impact, the cancelled orders, disrupted manufacturing, and even bankruptcy. But in this blog, I will describe how organizations bounced back when an incident occurred. It will focus on resilience, what real organizations have done right, and the lessons others can take away.</p>
<h2>Cyber Resilience</h2>
<p>Cyber resilience is about more than just stopping attacks &mdash; it is about bouncing back from them. It is the ability of an organization to keep operating, recover quickly, and adapt when faced with disruption. True resilience blends technology, people, and process: strong defenses, well-rehearsed recovery plans, clear communication, and a culture that learns from every incident to come back stronger.</p>
<p>While organizations often invest heavily in cyber protection processes and technologies official statistics show less investment in resilience.</p>
<ul>
<li>According to the UK government <a href="https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2024/cyber-security-breaches-survey-2024" target="_blank">cyber security breaches survey 2024</a> only 22% of UK businesses have a formal incident response plan in place (rising to 73% for large firms). Even basic IR processes (clear roles, reporting guidance) sit at ~30&ndash;37% adoption.</li>
<li><a href="https://op.europa.eu/webpub/eca/special-reports/hack-proofing-eu-institutions-05-2022/en/" target="_blank">The European Court of Auditors</a> found preparedness across EU institutions &ldquo;not commensurate with the threats,&rdquo; with key controls not implemented and &ldquo;a number of EUIBAs clearly underspending on cybersecurity.&rdquo;</li>
</ul>
<p>According to the <a href="https://www.ibm.com/reports/data-breach" target="_blank">2025 IBM Cost of a Data Breach</a> report &ldquo;Among the organizations that had fully recovered, 76% said the recovery took longer than 100 days&rdquo;. This illustrates the need for improved cyber resilience.</p>
<h2>Business Process Resilience</h2>
<p>As business processes have become digitized the way they were done before is often forgotten. Having another way to perform the most important business processes in the event of a cyber incident is a key element of resilience.</p>
<ul>
<li>When the aluminum smelter Norsk Hydro was hit by a ransomware attack in 2019, they were able to <a href="https://time.com/6080293/norsk-hydro-ransomware-attack" target="_blank">keep the production processes operating</a> using the knowledge of retirees and former employees using a paper-based system.</li>
<li>During the 2025 cyber-attack on M&amp;S, they were able to keep their stores open by <a href="https://corporate.marksandspencer.com/media/press-releases" target="_blank">moving some of their processes and systems offline</a>.</li>
</ul>
<h2>Data Resilience</h2>
<p>Data backup, often seen as the <a href="https://www.kuppingercole.com/research/lc80868/cloud-backup-for-ai-enabled-cyber-resilience" target="_blank">last line of defense against cyber-attacks</a>, takes on a strategic role in this context. A well-planned backup strategy, whether to a cloud or physical location, provides your organization with resilience against not only cyber threats but also other risks to your business continuity.</p>
<ul>
<li>In October 2023, The British Library was hit by the Rhysida ransomware group, leading to extensive server encryption, data exfiltration, and a full lockout of many networked systems. While many systems were down, non-IT/onsite services (events, exhibitions) continued in degraded or offline mode, showing that they had fallback arrangements. According to the <a href="https://cdn.sanity.io/files/v5dwkion/production/99206a2d1e9f07b35712b78f7d75fbb09560c08d.pdf" target="_blank">report into the incident</a>, they were able to identify viable sources of backups from which data could be recovered.</li>
<li>In another example, <a href="https://www.bandicoot.co.uk/it-support-case-studies/case-study-rapid-recovery-from-a-ransomware-attack" target="_blank">reported by Bandicoot</a>, in August 2025, a medium-sized UK trading company suffered a ransomware attack. The attack encrypted multiple user computers and the main server, leaving critical files inaccessible. Immutable backups prevented major data loss, and business downtime was minimized.</li>
</ul>
<h2>Prepare and Practice Incident Response</h2>
<p>Proper preparation and practice prevent problems from getting worse. Your organization needs a <a href="https://www.kuppingercole.com/research/lb80209/responding-to-cyber-incidents" target="_blank">well-prepared incident response plan with clearly defined people</a>, processes and responsibilities. You may also need to have set up arrangements with cyber-incident response specialists to help.</p>
<ul>
<li>Microsoft published an example <a href="https://learn.microsoft.com/en-us/security/ransomware/dart-ransomware-case-study" target="_blank">case study</a> of how their incident response teams helped a customer following a ransomware attack in November 2024.</li>
<li>In the UK, Gloucester City Council published <a href="https://www.local.gov.uk/sites/default/files/documents/Gloucester%20City%20Case%20Study%20-%20Managing%20a%20Cyber%20Attack.pdf" target="_blank">a report on their recovery</a> from an incident that was due to a single spear phishing email that was inserted into an existing email chain with a supplier. More on this later.</li>
</ul>
<h2>Pen and Paper</h2>
<p>The UK NCSC recommends that organizations have a cyber incident plan on paper because, when a cyber incident occurs, you cannot depend on access to your systems. This includes email, messaging, and internet-based phones. You must have access to your plan and have prepared how you will communicate in advance.</p>
<ul>
<li>In 2021 Health Services Executive (HSE) was hit by Conti Ransomware. <a href="https://www.lenus.ie/server/api/core/bitstreams/6e5de68e-1a19-49f9-bda0-6bc209690f13/content" target="_blank">The PwC / HSE Independent Review</a> reports that &ldquo;Normal communication channels, both at HSE&rsquo;s national center and within operational services were also immediately lost&hellip; Staff switched to communicating using mobile and analogue phones; fax; and face to face meetings.</li>
<li>In March 2025, the Polish Space Agency (POLSA) suffered a cyber-attack and, <a href="https://www.theregister.com/2025/03/03/polish_space_agency_confirms_cyberattack/" target="_blank">according to reports</a> &ldquo;staff are being told to use phones for communication instead of email&rdquo;.</li>
</ul>
<h2>Out with the Old</h2>
<p>Most organizations have an archeology of IT systems. These legacy systems may still work but the software may not be supported, and replacement parts may be difficult to obtain. Another complexity when a cyber-incident occurs is personalization. Bespoke configurations of commercial off the shelf software can be difficult to recover.</p>
<ul>
<li>The <a href="https://cdn.sanity.io/files/v5dwkion/production/99206a2d1e9f07b35712b78f7d75fbb09560c08d.pdf" target="_blank">report into the incident</a> at the British Library identified that their reliance on legacy infrastructure was the primary contributor to the length of time that the it took to recover from the attack.</li>
<li>One of the lessons learned by Gloucester City Council <a href="https://www.local.gov.uk/sites/default/files/documents/Gloucester%20City%20Case%20Study%20-%20Managing%20a%20Cyber%20Attack.pdf" target="_blank">in the report</a> on their cyber incident was &ldquo;the danger of customizing applications to fit local needs as this caused ongoing compatibility issues between off-the-shelf versions and backed-up files&rdquo;.</li>
</ul>
<h2>Clean Rooms and Cloud</h2>
<p>One of the major problems when recovering from a cyber-attack is to be sure that you have removed all the malware. This has led to vendors offering &ldquo;clean room&rdquo; recovery services. These are usually hosted in a cloud and replicate the customer&rsquo;s clean applications.</p>
<ul>
<li>In the Gloucester City cyber-incident, the council was running a hybrid system. The cloud-hosted applications were not affected except where they interfaced with data held on the council&rsquo;s own server.</li>
<li>Data backup to cloud also provides an air gap as well as immutable storage that helps to ensure clean restoration and recovery.</li>
</ul>
<h2>Learn and Improve</h2>
<p>In all the examples where organizations have recovered from a cyber-incident, they report that they have learnt from the experience. Most commonly they learned that their organization is a target. Many previously did not think they were significant enough to be one. Every organization took steps to improve their cyber defense capabilities as well as their incident response plans.</p>
<h2>Opinion</h2>
<p>Organizations now face a constant barrage of cyber-attacks. It is essential that they not only invest in strong protection against these threats but also build cyber resilience into their business systems. Cyber resilience is different from high availability; cyber resilience builds rapid recovery from failure into the design and implementation of critical business systems. In this blog I have touched on the lessons that can be learnt from organizations that have recovered from cyber-attacks.</p>
<p>By learning from these examples your organization can strengthen business continuity and resilience against cyber-threats. To explore best practices in cyber resilience, join us at <a href="https://www.kuppingercole.com/events/iccid2025" target="_blank">Identity-Centric Cybersecurity Impact Day 2025</a> in Frankfurt November 6th, 2025.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Nitish Deshpande</dc:creator>			<pubDate>Tue, 28 Oct 2025 11:19:43 +0100</pubDate>
			<title><![CDATA[Nexis]]></title>
			<link>https://www.kuppingercole.com/research/ev81449/nexis</link>
			<guid>https://www.kuppingercole.com/research/ev81449/nexis</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Nitish Deshpande</a></p>This KuppingerCole Executive View looks at the issues and options available to IT managers and security strategists to manage identity access to complex IT infrastructures. A technical review of the Nexis platform (NEXIS 4) is included.							]]></description>
		</item>
				<item>
						<pubDate>Tue, 28 Oct 2025 00:00:00 +0100</pubDate>
			<title><![CDATA[Adding Identity to Security | Identity-Centric Cybersecurity Impact Day Spotlight]]></title>
			<link>https://www.kuppingercole.com/watch/2025-iccid-speaker-spotlight-martin-sandren</link>
			<guid>https://www.kuppingercole.com/watch/2025-iccid-speaker-spotlight-martin-sandren</guid>
			<description><![CDATA[ <p><strong>Identity-centric security is reshaping how organizations defend against attacks &mdash; and Martin Sandren (IAM Product Lead, IKEA) knows exactly why identity has become the new frontline.</strong></p>
<p>Today, Martin shares how leaders can strengthen their cybersecurity posture by integrating identity deeply into their security frameworks &mdash; and what lessons IKEA learned while rolling out large-scale identity programs across the globe.</p>
<p>You&rsquo;ll learn:<br /> ✅ Why attackers increasingly target identity &mdash; and how AI-driven phishing amplifies the threat<br /> ✅ How to build a resilient, defense-in-depth strategy that anticipates inevitable compromises<br /> ✅ The importance of change management in global identity rollouts<br /> ✅ Where organizations often struggle when aligning IAM and cybersecurity teams<br /> ✅ Practical steps to make life harder for attackers &mdash; while keeping employees on board</p>
<p>📌 Don&rsquo;t miss Martin&rsquo;s session at <strong>Identity-Centric Cybersecurity Impact Day 2025</strong>, where he&rsquo;ll share real-world lessons from IKEA&rsquo;s journey and how to turn identity into a true enabler of security.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/2025-iccid-speaker-spotlight-martin-sandren"><img src="https://www.kuppingercole.com//videothumb/2025-iccid-speaker-spotlight-martin-sandren/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 24 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[The New Face of Fraud: How AI Agents Are Rewriting Digital Trust and Risk]]></title>
			<link>https://www.kuppingercole.com/watch/tackling-modern-fraud</link>
			<guid>https://www.kuppingercole.com/watch/tackling-modern-fraud</guid>
			<description><![CDATA[ <p>Fraud is entering a phase where familiar defenses lose their value. With generative AI and consumer agents now mediating digital interactions, once-reliable signals like device fingerprints, behavioral biometrics, and even &ldquo;clean&rdquo; sessions can no longer be trusted. Legacy fraud reduction tools weren&rsquo;t built for this new reality, and organizations now face a critical challenge: how to outpace increasingly sophisticated fraud without adding friction to trusted customers.</p>
<p>Enterprises can no longer assume fraud looks like bots hammering login forms. They must prioritize intent-based detection, explainable risk engines and low-friction defenses that address account takeover, policy abuse and sophisticated merchant fraud across the digital journey.</p>
<p>John Tolbert, Director of Research and Lead Analyst at KuppingerCole Analysts will share insights from the 2025 Leadership Compass on FRIP platforms. He will cover major market shifts such as fraud spreading beyond finance, the growing use of AI in scams and the rising importance of governance. John will also outline which FRIP capabilities leaders should prioritize to stay prepared for the agent era.</p>
<p>David Mahdi,&nbsp;<!--StartFragment--><span data-olk-copy-source="MessageBody">Chief Identity Officer</span><!--EndFragment--> at Transmit Security will explain how enterprises can respond with a new fraud playbook. He will introduce Transmit Security&rsquo;s Mosaic Platform and Predictive AI, designed to counter GenAI threats with real-time intent scoring, policy-abuse detectionand fraud-first CIAM integration. David will also share real-world results showing reduced fraud, lower costs, and better customer experiences.<br /><br /></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/tackling-modern-fraud"><img src="https://www.kuppingercole.com//videothumb/tackling-modern-fraud/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Jonathan Care</dc:creator>			<pubDate>Thu, 23 Oct 2025 10:53:03 +0200</pubDate>
			<title><![CDATA[CoreView]]></title>
			<link>https://www.kuppingercole.com/research/ev81138/coreview</link>
			<guid>https://www.kuppingercole.com/research/ev81138/coreview</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Jonathan Care</a></p>CoreView ist eine auf Microsoft 365 spezialisierte Cyber Resilience-Plattform, die die Umsetzung von Zero Trust-Konzepten, eine granulare Least Privilege-Verwaltung und eine umfassende Automatisierung ermöglicht, um komplexe Unternehmensumgebungen zu sichern und in einheitlicher Weise zu schützen. Die eigenentwickelte Virtual Tenant-Architektur, KI-gestützte Workflows und Funktionen für die Umsetzung regulatorischer Compliance adressieren sowohl Sicherheits- als auch Betriebsanforderungen, insbesondere für Unternehmen in regulierten Märkten. Mit kontinuierlichem Wachstum und als profitables Unternehmen liefert CoreView spezialisierte Lösungen, die die IAM-Strategien für den spezifischen Bereich von Microsoft 365 ergänzen.							]]></description>
		</item>
				<item>
						<pubDate>Thu, 23 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Building Blocks of an Effective IT Governance Organization]]></title>
			<link>https://www.kuppingercole.com/watch/revolutionize-it-governance</link>
			<guid>https://www.kuppingercole.com/watch/revolutionize-it-governance</guid>
			<description><![CDATA[ <p>Many organizations proudly claim to have IT governance in place, yet when faced with audits, incidents, or transformation projects, weaknesses quickly surface. Governance often remains a paper exercise, detached from real operations. This gap between theory and practice undermines trust, slows innovation, and exposes enterprises to significant compliance and security risks.</p>
<p>The future of governance is not about more policies but about embedding technology into accountability. Automation, continuous monitoring, and integrated risk dashboards turn governance from a checkbox activity into a living framework. By linking compliance, strategy, and daily IT operations, companies can create models that are measurable, transparent, and adaptable to disruption.</p>
<p>Kai Boschert, Senior Advisor &amp; Deputy CISO at KuppingerCole challenges common misconceptions around IT governance. He exposes why traditional approaches fail, demonstrate how to balance regulatory requirements with business agility, and outline methods to make governance an enabler rather than a bottleneck. Kai also shares case insights on scalable, real-world governance practices.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/revolutionize-it-governance"><img src="https://www.kuppingercole.com//videothumb/revolutionize-it-governance/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Wed, 22 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Buy and Build: A New Paradigm for Modernizing Authorization]]></title>
			<link>https://www.kuppingercole.com/watch/modular-api-security</link>
			<guid>https://www.kuppingercole.com/watch/modular-api-security</guid>
			<description><![CDATA[ <p>Enterprises across industries with large user bases are under pressure to evolve their digital services without disrupting existing identity systems. Traditional authorization approaches fall short when it comes to agility, security, and cost-efficiency.</p>
<p>Modern technology allows a modular &ldquo;buy and build&rdquo; strategy: leveraging best-in-class components for core security like API protection while building the remaining stack around existing identity infrastructure. This hybrid model helps balance control, compliance, and performance.</p>
<p>Alejandro Leal, Senior Analyst at KuppingerCole will provide an industry analyst&rsquo;s perspective on the challenges enterprises face in authorization modernization. He will discuss current trends, regulatory drivers, and best practices for balancing security, interoperability, and business agility. He will illustrate how a modular strategy enables greater control over identity, enhanced user experience, and more sustainable compliance across API-heavy environments.</p>
<p>Ali Adnan, Co-founder of Authlete, and Zulfiqar Ahmed, Vice President of Product at Authlete, will share how organizations are applying the buy-and-build model. They will present real-world examples from financial services and media, including Nubank and DPG Media, and explain how to seamlessly integrate API-first authorization into existing architectures without sacrificing control or security.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/modular-api-security"><img src="https://www.kuppingercole.com//videothumb/modular-api-security/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Warwick Ashford</dc:creator>			<pubDate>Tue, 21 Oct 2025 14:30:00 +0200</pubDate>
			<title><![CDATA[IPSIE: Standardizing SaaS Identity or Overlooking the Bigger Problem?]]></title>
			<link>https://www.kuppingercole.com/blog/ashford/ipsie-standardizing-saas-identity-or-overlooking-the-bigger-problem</link>
			<guid>https://www.kuppingercole.com/blog/ashford/ipsie-standardizing-saas-identity-or-overlooking-the-bigger-problem</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Warwick Ashford</a></p><p><strong>The fractured state of enterprise identity</strong></p>
<p>Identity continues to be the biggest vulnerability in enterprise security. The majority of breaches still involve compromised credentials, yet most organizations wrestle with fragmented and inconsistent identity systems. Enterprises depend on multiple Software as a Service (SaaS) applications, each with its own approach to Single Sign-On (SSO), provisioning, and session management. Developers often face a patchwork of protocols, optional features, and provider-specific requirements that make integration error-prone and governance difficult. This complexity fuels identity sprawl, increases operational overhead, and leaves dangerous gaps in access control.</p>
<p><strong>Why standardization is needed now</strong></p>
<p>The absence of a common framework for identity security has long been a weakness. Protocols such as Security Assertion Markup Language (SAML), OpenID Connect (OIDC), and System for Cross-domain Identity Management (SCIM) provide the building blocks, but their flexibility is a double-edged sword. Too much optionality means implementations diverge, creating interoperability issues and security blind spots. Enterprises struggle to achieve consistent outcomes such as secure provisioning, predictable session lifecycles, and reliable signal sharing. Developers face repeated work to adapt to each integration, while security teams face uncertainty about whether controls are being enforced in practice.</p>
<p>Against this backdrop, an <a href="https://openid.net/" target="_blank">OpenID Foundation</a> working group aims to provide a unifying standard. Backed by Okta, Microsoft, Ping Identity, Beyond Identity, SGNL, Capital One, Cisco&rsquo;s Duo Security division and others, the initiative promises to simplify and harden enterprise identity security.</p>
<p><strong>What IPSIE is and why it matters</strong></p>
<p>The OIDF <a href="https://openid.net/wg/ipsie/" target="_blank">Interoperability Profiling for Secure Identity in the Enterprise (IPSIE) working group</a> develops profiles of existing standards to reduce complexity and guarantee interoperability. Rather than inventing new protocols, IPSIE delivers opinionated specifications that strip away optionality and enforce secure defaults. Its goal is to make identity standards easier to implement, test, and certify.</p>
<p>Key areas of focus include:</p>
<ul>
<li><strong>SSO:</strong> Centralizing login and ensuring secure session handling</li>
<li><strong>Account Lifecycle (AL):</strong> Automating user provisioning and deprovisioning to prevent orphaned accounts</li>
<li><strong>Entitlements:</strong> Enforcing least privilege and supporting role synchronization across systems</li>
<li><strong>Risk Signal Sharing:</strong> Exchanging alerts about threats or device posture to improve response</li>
<li><strong>Session Termination and Token Revocation:</strong> Ensuring compromised sessions are cut off immediately</li>
</ul>
<p>IPSIE introduces maturity levels to define what secure implementations look like in practice. For example, Session Lifecycle Level 1 (SL1) requires compliance with US National Institute of Standards and Technology (NIST) Special Publication 800-63-4 at Federation Assurance Level 2 (FAL2), enforcing Multifactor Authentication (MFA) and requiring applications (relying parties) to set their session duration based on the validity period defined in the federation assertion. Higher levels add capabilities such as session state communication between apps and identity providers. Similarly, AL levels progress from basic user provisioning (AL1) to full synchronization of application roles and entitlements (AL3).</p>
<p>The first draft profile is already in circulation, with <a href="https://openid.github.io/ipsie-openid-sl1/draft-openid-ipsie-sl1-profile.html?" target="_blank">OIDC SL1</a> serving as an early demonstration of how IPSIE maps existing protocols to concrete operational behaviors.</p>
<p>This structured approach brings clarity where today there is ambiguity. Instead of vague requirements like &ldquo;support SSO,&rdquo; IPSIE provides measurable, testable criteria. With conformance testing and certification, enterprises will be able to trust that applications meet consistent security expectations.</p>
<p><strong>The promise and the limits of IPSIE</strong></p>
<p>IPSIE addresses real and persistent challenges. By narrowing choices and enforcing secure defaults, it reduces the likelihood of weak or inconsistent implementations. Enterprises benefit from better visibility and stronger controls. SaaS providers benefit from a common standard that makes integration predictable and reduces costly one-off engineering.</p>
<p>But IPSIE&rsquo;s scope is clearly human-centric. Its focus is SaaS identity flows tied to workforce users, including authentication, lifecycle, entitlements, and logout. Missing from the IPSIE charter are non-human identities: service accounts, CI/CD tokens, API keys, IoT device credentials, and machine-to-machine workloads. These identities are proliferating rapidly, often unmanaged, and present one of the largest attack surfaces today. If IPSIE does not extend its model to include them, the NHI problem will remain largely unresolved.</p>
<p>Some observers have also cautioned that IPSIE risks being too broad, trying to cover everything from login to entitlements to logout in one sweep. Others compare it to the early days of the FIDO Alliance, where progress came by focusing on a narrow, well-defined problem before expanding. IPSIE&rsquo;s long-term success will depend on whether it can balance ambition with pragmatism and secure adoption across vendors.</p>
<p><strong>A step toward solving the NHI challenge</strong></p>
<p>IPSIE is not the complete answer to non-human identity governance, but it is an important step. Standardized, interoperable, secure-by-default profiles for SaaS identity will reduce identity sprawl and strengthen enterprise controls. Yet without extending its scope to machine identities, IPSIE risks addressing only part of the problem. For a full solution, enterprises will still need lifecycle governance, automated secrets rotation, least-privilege enforcement, and continuous discovery across all identities, human and non-human.</p>
<p><strong>How KuppingerCole can help</strong></p>
<p>KuppingerCole Analysts can help organizations make sense of this evolving space. Our research on <a href="https://www.kuppingercole.com/research/lc80893/identity-fabrics" target="_blank">identity fabrics</a>, <a href="https://www.kuppingercole.com/research/an80853/maturity-level-for-zero-trust-a-comprehensive-analysis" target="_blank">Zero Trust strategies</a>, and <a href="https://www.kuppingercole.com/research/an80976/machine-identities" target="_blank">machine identity management</a> provides a framework for addressing both human and non-human identity challenges. We have published Advisory Notes on <a href="https://www.kuppingercole.com/research/an80990/from-machine-identity-to-agentic-ai-charting-the-nhi-continuum" target="_blank">non-human identity governance</a> and Leadership Compass reports on <a href="https://www.kuppingercole.com/research/lc80830/privileged-access-management" target="_blank">Privileged Access Management</a> that highlight the importance of consistent lifecycle controls for machine identities.</p>
<p>IPSIE represents progress. By bringing clarity and interoperability to enterprise SaaS identity, it addresses a pressing security gap. But the wider challenge of non-human identity still looms large. Organizations should welcome IPSIE as part of the solution, while recognizing that much work remains to be done.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Tue, 21 Oct 2025 12:47:39 +0200</pubDate>
			<title><![CDATA[SAP Security: The Need for a Holistic Security Architecture and Organization]]></title>
			<link>https://www.kuppingercole.com/research/an81028/sap-security-the-need-for-a-holistic-security-architecture-and-organization</link>
			<guid>https://www.kuppingercole.com/research/an81028/sap-security-the-need-for-a-holistic-security-architecture-and-organization</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>In this comprehensive analysis of SAP Security, we look at the multifaceted challenge of safeguarding SAP environments, which are central components of modern enterprises’ digital infrastructure. These systems, responsible for executing critical business operations, are facing increasingly complex threats that demand thorough, integrated security measures beyond traditional paradigms. This report outlines a holistic approach to SAP security, emphasizing its alignment within the broader cybersecurity and IAM frameworks, highlighting the need for augmented capabilities to manage both SAP-specific and enterprise-wide risks effectively.							]]></description>
		</item>
				<item>
						<pubDate>Fri, 17 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Turn Zero Trust Into Everyday SAP Reality]]></title>
			<link>https://www.kuppingercole.com/watch/zero-trust-sap</link>
			<guid>https://www.kuppingercole.com/watch/zero-trust-sap</guid>
			<description><![CDATA[ <p>SAP is the beating heart of many enterprises, but risky ABAP code, unmanaged transports, and poor compliance visibility can stop it cold. Manual reviews are too slow, threats move too fast, and audits demand too much. It&rsquo;s time for a shift from reactive fixes to continuous, automated SAP governance. <br /> <br />Modern application governance tools can automatically identify and block risky changes before deployment, enforce granular transport controls, and provide real-time monitoring. By combining intelligent policy enforcement with delegated control, these solutions give IT and compliance teams full visibility while streamlining audit readiness. The result is a secure, Zero Trust SAP environment that operates efficiently and stays continuously compliant. <br /> <br /><strong>Martin Kuppinger, Principal Analyst &amp; Co-Founder at KuppingerCole</strong>&nbsp;will explore current industry trends shaping SAP security and compliance, including the shift from static to real-time governance, the role of Zero Trust at the application layer, and the growing importance of automation in meeting audit and regulatory demands. They will provide a market perspective on best practices and common pitfalls in SAP change management. <br /> <br /><strong>Clemens Guetter, SAP Architect at Pathlock</strong>&nbsp;will demonstrate how Pathlock&rsquo;s Application Profiler for SAP secures custom code and change management. He will show how to detect and block risky ABAP code before deployment, enforce transport controls, and provide compliance teams with full application-level visibility. Clemens will highlight real-world use cases where Pathlock has enabled continuous compliance and streamlined audit readiness without disrupting operations.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/zero-trust-sap"><img src="https://www.kuppingercole.com//videothumb/zero-trust-sap/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Thu, 16 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Fraud Prevention for the Finance Industry: A Look at the Fraud Reduction Intelligence Platform Landscape in 2025]]></title>
			<link>https://www.kuppingercole.com/watch/frip-landscape</link>
			<guid>https://www.kuppingercole.com/watch/frip-landscape</guid>
			<description><![CDATA[ <p>This webinar explores how Fraud Reduction Intelligence Platforms (FRIPs) help financial institutions detect and prevent sophisticated fraud, including synthetic identities, mule accounts, and social engineering scams. Attendees will preview the latest Leadership Compass results, learn how top FRIPs operationalize behavioral and device intelligence, and explore integration strategies with IDV and AML/KYC systems. The session also covers the rise of romance, travel, and crypto scams and how FRIPs can mitigate authorized fraud through behavioral anomaly detection and real-time decisioning.</p>
<p>Attendees will:</p>
<ul>
<li>Gain an understanding of the evolving fraud threat landscape in financial services, including how FRIP solutions mitigate sophisticated attack vectors such as synthetic identities, mule accounts, and real-time social engineering.</li>
<li>Learn how leading FRIP platforms operationalize risk signals&mdash;such as device intelligence, credential reputation, and behavioral analytics&mdash;to enable faster and more accurate fraud decisioning.</li>
<li>Explore integration strategies for FRIP within fraud operations workflows, including orchestration with IDV services and AML/KYC systems.</li>
<li>Understand the KuppingerCole Leadership Compass methodology and evaluation criteria</li>
<li>Get an exclusive preview of the latest Leadership Compass results, highlighting how FRIP vendors compare in terms of capabilities, innovation, and relevance to fraud prevention in finance.</li>
</ul>
<p>John shares practical insights from recent research on FRIP for Finance, highlighting how operations teams can use risk signals to make faster, more accurate decisions. He discusses emerging scam tactics that bypass traditional controls, and how fraud teams can adapt. Attendees will hear how to evaluate vendor capabilities, prioritize integration points, and align platform selection with both operational demands and strategic risk objectives&mdash;grounded in the latest Leadership Compass findings.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/frip-landscape"><img src="https://www.kuppingercole.com//videothumb/frip-landscape/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Warwick Ashford</dc:creator>			<pubDate>Wed, 15 Oct 2025 23:40:03 +0200</pubDate>
			<title><![CDATA[Beyond the Password: Making Identity the Living Perimeter of Cybersecurity]]></title>
			<link>https://www.kuppingercole.com/blog/ashford/beyond-the-password-making-identity-the-living-perimeter-of-cybersecurity</link>
			<guid>https://www.kuppingercole.com/blog/ashford/beyond-the-password-making-identity-the-living-perimeter-of-cybersecurity</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Warwick Ashford</a></p><p class="p1">For more than two decades, security professionals have repeated the mantra that identity is the new perimeter. Yet only now are IAM practices catching up with this truth. The reason is simple: passwords. They have been the default method of authentication since the early days of the Internet, and they have stubbornly resisted replacement. Despite endless warnings about their weaknesses, organizations have clung to them because they were easy to deploy, familiar to users, and supported everywhere. The result has been decades of breaches where attackers used stolen or guessed credentials as their&nbsp;means of entry.&nbsp;&nbsp;</p>
<h2 class="p1">Passwords and One-Time Authentication Keep Failing&nbsp;</h2>
<p class="p1">The problem with passwords is not only that they can be stolen, reused, or phished, but that they also&nbsp;represent&nbsp;a static, one-time event. Authenticate once, and you may enjoy unfettered access for hours or days. Attackers know this. High-profile incidents&nbsp;such as the cyberattack on&nbsp;<a href="https://inszoneinsurance.com/blog/cyberattack-mgm-resort-explained"><span class="s1">MGM Resorts in 2024</span></a>&nbsp;show&nbsp;how attackers exploit&nbsp;legitimate&nbsp;credentials to gain footholds, then pivot deeper into networks. Even when multifactor authentication is in place, if it relies on&nbsp;Short Message Service (SMS)&nbsp;codes or push notifications, attackers have learned to bypass&nbsp;these&nbsp;or&nbsp;bully&nbsp;users into granting access.&nbsp;The bottom line is that&nbsp;static credentials&nbsp;and&nbsp;static trust&nbsp;result in&nbsp;exposure.&nbsp;</p>
<h2 class="p1">Zero Trust and&nbsp;Passwordless&nbsp;Belong Together&nbsp;</h2>
<p class="p1">The industry response has been Zero Trust, which&nbsp;dictates&nbsp;that no user or device should be trusted by default. But Zero Trust on its own is a philosophy, not a solution. To make it practical, enterprises need authentication methods that do not rely on outdated passwords. This is where&nbsp;passwordless&nbsp;access comes in. By&nbsp;eliminating&nbsp;the password altogether and replacing it with strong cryptographic keys, biometrics, or device-based authenticators, organizations can remove one of the weakest links in security.&nbsp;</p>
<p class="p1">Yet even Zero Trust plus&nbsp;passwordless&nbsp;is not enough. Identity must be verified not just at the point of entry but continuously. This is why many experts argue that continuous authentication is a more precise term. It reflects the idea that trust is never static but must be&nbsp;continuously&nbsp;validated&nbsp;or at least&nbsp;confirmed at every stage of a&nbsp;user&rsquo;s session.&nbsp;</p>
<h2 class="p1">Why Continuous Authentication Matters&nbsp;</h2>
<p class="p1">Continuous authentication builds on&nbsp;passwordless&nbsp;by turning identity into a&nbsp;constant&nbsp;assurance rather than a single checkpoint. Instead of trusting a session indefinitely once it begins, organizations can evaluate ongoing signals such as user&nbsp;behavior, device&nbsp;posture, geolocation, and time of day. If something changes, such as&nbsp;a user suddenly connects from another country or&nbsp;attempts&nbsp;to access sensitive data after hours,&nbsp;the system can demand step-up verification or cut off access.&nbsp;</p>
<p class="p1">Passwordless&nbsp;authentication makes this possible because it lowers friction. Removing passwords means users are not burdened with repeated prompts. Instead, cryptographic keys and biometrics can be invoked invisibly in the background to confirm identity without disrupting work. The combination of&nbsp;passwordless&nbsp;and&nbsp;continuous authentication transforms identity from a static perimeter into a dynamic risk signal.&nbsp;</p>
<h2 class="p1">The Benefits and the Challenges&nbsp;</h2>
<p class="p1">The advantages of this shift are compelling. Security improves dramatically because attackers cannot simply steal a password or trick a user once. Costs come down&nbsp;because&nbsp;helpdesk calls for password resets disappear. User experience improves as workers no longer&nbsp;have to&nbsp;remember dozens of complex credentials. Risk signals can be applied in real time, allowing security teams to block threats before they escalate.&nbsp;</p>
<p class="p1">But challenges&nbsp;remain. Interoperability is a real issue. Enterprises run a patchwork of legacy systems, cloud services, and mobile platforms that do not always support new standards such as&nbsp;<a href="https://www.kuppingercole.com/research/ev80059/fido2"><span class="s1">Fast Identity Online&nbsp;2</span></a>&nbsp;(FIDO2)&nbsp;or&nbsp;<a href="https://www.w3.org/TR/webauthn-2/"><span class="s1">Web Authentication</span></a>&nbsp;(WebAuthn). Recovery processes must be carefully designed. If users lose their devices or biometrics fail, they must still regain access securely without falling back to the same old password model. Change management is another barrier, as organizations need to educate users and executives alike that Zero Trust and&nbsp;passwordless&nbsp;are not single products but ongoing journeys.&nbsp;</p>
<h2 class="p1">Identity-Centric Security in Practice&nbsp;</h2>
<p class="p1">The good news is that adoption is accelerating. Apple, Google, and Microsoft are all pushing passkeys, while leading enterprise vendors such as Cisco, CyberArk, Microsoft, Okta, and Ping Identity are building&nbsp;passwordless&nbsp;and continuous authentication into their platforms. Regulators are also turning up the pressure.&nbsp;Guidance from the&nbsp;<a href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf"><span class="s1">US government</span></a>&nbsp;and Europe&rsquo;s regulations&nbsp;like&nbsp;the&nbsp;<a href="https://eur-lex.europa.eu/eli/reg/2022/2554"><span class="s1">Digital Operational Resilience Act</span></a>&nbsp;call for&nbsp;strong&nbsp;authentication and identity-centric access controls.&nbsp;</p>
<p class="p1">Identity is now firmly at the&nbsp;center&nbsp;of cybersecurity strategy. But for it to serve as the true perimeter, it must be dynamic, continuous, and&nbsp;passwordless. Static trust models&nbsp;belong to a bygone&nbsp;era.&nbsp;</p>
<p class="p1">For organizations&nbsp;seeking&nbsp;to understand how to make this shift from principle to practice,&nbsp;KuppingerCole&rsquo;s&nbsp;<a href="https://www.kuppingercole.com/events/iccid2025"><span class="s1">Identity-Centric Cybersecurity Impact Day 2025</span></a> in Frankfurt on 6 November will&nbsp;provide&nbsp;practical insights from real-world implementations.&nbsp;&nbsp;</p>
<p class="p1">To avoid becoming the next cautionary tale, now is the time to learn how to make &ldquo;identity is the perimeter&rdquo; more than just a slogan. It is time to make it real.&nbsp;</p>
<div id="lv-root"></div>
<div id="gtx-trans" style="position: absolute; left: -69px; top: 1637.69px;">
<div class="gtx-trans-icon"></div>
</div>							]]></description>
		</item>
				<item>
						<pubDate>Wed, 15 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Identity Without Intelligence Fails to Deliver Governance]]></title>
			<link>https://www.kuppingercole.com/watch/replacing-fragmented-iam</link>
			<guid>https://www.kuppingercole.com/watch/replacing-fragmented-iam</guid>
			<description><![CDATA[ <p>Most enterprises still rely on siloed IAM tools stitched together with manual workarounds. The result: blind spots in authorizations, fragmented governance and compliance efforts that look good on paper but fail under scrutiny. Without true visibility across identities and entitlements, organizations are exposed to risks they cannot even quantify.</p>
<p>Technology alone does not solve the problem unless it is designed for integration and intelligence. Nexis takes a different approach by embedding Identity Visibility and Intelligence (IVIP) directly into the Identity Fabric. Instead of adding yet another tool, it connects IGA, PAM, and IDPs into a risk-aware system that not only identifies gaps but also drives remediation and measurable governance outcomes.</p>
<p>Martin Kuppinger, Co-Founder and Principal Analyst at KuppingerCole, will argue that current IAM strategies fall short because they treat identity as a technical silo rather than a governance backbone. He will show why enterprises must move beyond fragmented tools and embrace Identity Fabrics as enablers of transparency, trust, and strategic decision-making.</p>
<p>Dr. Heiko Klarl, CEO at Nexis, will demonstrate how Nexis challenges the status quo by eliminating manual IAM processes and exposing hidden risks. He will explain how Nexis unifies authorization governance, delivers automated compliance evidence, and integrates IAM into GRC and Enterprise Risk Management. His perspective will illustrate how IAM can shift from being a cost center to a driver of trust and efficiency.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/replacing-fragmented-iam"><img src="https://www.kuppingercole.com//videothumb/replacing-fragmented-iam/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Tue, 14 Oct 2025 12:54:51 +0200</pubDate>
			<title><![CDATA[Security for the agile IT: Bridging DevSecOps, NHI Management, PAM, CIEM, and more]]></title>
			<link>https://www.kuppingercole.com/research/an82008/security-for-the-agile-it-bridging-devsecops-nhi-management-pam-ciem-and-more</link>
			<guid>https://www.kuppingercole.com/research/an82008/security-for-the-agile-it-bridging-devsecops-nhi-management-pam-ciem-and-more</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>As organizations continue to embrace digital transformation, the shift towards DevSecOps methodologies is reshaping how security is integrated into agile IT environments. This evolution demands a strategic reevaluation of identity and access management (IAM) systems to address not only traditional threats but also those associated with Non-Human Identities (NHI) such as automated processes, AI systems, and IoT devices. This advisory note provides targeted insights for CISOs and IAM leaders, offering guidance on enhancing security frameworks that effectively manage identities across diverse, dynamic environments.							]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Tue, 14 Oct 2025 09:45:51 +0200</pubDate>
			<title><![CDATA[Time for an Early Paradigm Shift: Why IVOP Should Replace IVIP]]></title>
			<link>https://www.kuppingercole.com/blog/kuppinger/why-ivop-should-replace-ivip</link>
			<guid>https://www.kuppingercole.com/blog/kuppinger/why-ivop-should-replace-ivip</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p><p>Within Identity and Access Management (IAM), Identity Visibility and Intelligence Platforms (IVIP) have emerged and gained quite some attention. They promise a unified view of diverse identity activities, consolidating insights across ecosystems. Nevertheless, a fundamental transition is needed early-on. It's time for thinking about IVOP - Identity Visibility and Observability Platforms - to take the reins. IVIP, in its current form, misses the mark of a true 'platform,' serving more as an amalgamation of capabilities rather than a robust, integrative solution.</p>
<h2>Why IVIP isn&rsquo;t enough</h2>
<p>The nomenclature of 'platform' usually refers to a foundational structure upon which various services are built, a hub that integrates and powers a suite of related functionalities. By this definition, IVIP, for all its benefits, falls short. Rather than constructing an integrative ecosystem, it predominantly focuses on collection and representation of insights through graphs and data visualization.</p>
<p>These capabilities, while useful, largely extend existing functionalities found in IAM systems. They add new layers by depicting identity relationships using identity graphs. However, they remain centered around human identities, hardly venturing into the demanding sphere of non-human identities (NHI) which increasingly dominate the identity space. For a future-focused solution, the scope must widen significantly.</p>
<h2>What Observability really means</h2>
<p>The pressing need today is not merely visibility but observability. While visibility provides data, observability transforms it into actionable insights, allowing for real-time reactions and adjustments. It is not enough to simply surface data; we require actionable intelligence to understand the nuances of identity behaviors and mitigate identity- and access-related risks across vast landscapes of both human and non-human entities.</p>
<p>IVIP, as it stands, is often limited to surfacing activities through reports and graphs. The leap to observability, however, involves continuous monitoring and analytic insights that drive immediate, automated responses. This evolution necessitates the integration of Identity Threat Detection and Response (ITDR) capabilities.</p>
<h2>Enhancing the Role of AI</h2>
<p>Thus, the role of Artificial Intelligence (AI) must expand beyond mere analysis of static privileges or proposing roles within organizations. Its true power lies in interpreting the concrete usage patterns of entitlements, focusing not only on who accesses what, but when and how often.</p>
<p>This dynamic analysis allows both for detective measures, identifying potentially malicious usage patterns, and preventative strategies by retiring unused entitlements or issuing temporary privileges. Such an approach will better align security efforts with actual business needs, promoting efficiency while reducing risk disproportionately.</p>
<h2>A Call for Integration and Action</h2>
<p>Markets today demand solutions that do more than offer insights; they seek for platforms that initiate actions. The 'P' in IVIP should symbolize an integrative platform where actions are not merely suggested but triggered, ensuring swift, decisive responses across all identity types and entitlements, precisely where IVOP comes into play.</p>
<p>The fully realized IVOP should integrate seamlessly with IGA, PAM, ITDR, and beyond, embracing multi-faceted identity realms and evolving towards continuous, real-time feedback loops.</p>
<h2>Beyond IVIP to IVOP</h2>
<p>In summary, while IVIP has provided foundational visibility, the identity landscape demands platforms that do more. The pivot to IVOP represents a future where identities are not just seen, but understood and managed dynamically across the digital spectrum. By firmly embedding observability, the next generation of identity solutions will not just safeguard but enhance digital ecosystems - a shift organizations should embrace to stay at the forefront of IAM innovation. Without observability, IVIP delivers visibility but denies organizations the control they urgently need.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Paul Fisher</dc:creator>			<pubDate>Tue, 14 Oct 2025 09:07:02 +0200</pubDate>
			<title><![CDATA[Rising Star Whiteswan]]></title>
			<link>https://www.kuppingercole.com/research/rs81420/rising-star-whiteswan</link>
			<guid>https://www.kuppingercole.com/research/rs81420/rising-star-whiteswan</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Paul Fisher</a></p>Whiteswan Security, founded in 2023, excels in identity threat detection through AI-driven analytics, offering automated threat responses in cloud environments. The solution's seamless integration with multi-cloud platforms and focus on Zero Trust models enhances security operations, although continuous updates and reliance on AI pose challenges amidst established competitors.							]]></description>
		</item>
				<item>
			<dc:creator>Warwick Ashford</dc:creator>			<pubDate>Mon, 13 Oct 2025 09:31:22 +0200</pubDate>
			<title><![CDATA[Secure Remote Access for OT/ICS]]></title>
			<link>https://www.kuppingercole.com/research/bc80755/secure-remote-access-for-ot/ics</link>
			<guid>https://www.kuppingercole.com/research/bc80755/secure-remote-access-for-ot/ics</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Warwick Ashford</a></p>Remote access in industrial contexts incurs risks due to legacy systems, visibility issues, third-party access, and session management challenges. Secure Remote Access (SRA) solutions mitigate these through strong authentication, granular access control, and session monitoring, ensuring continuity while minimizing operational disruptions and facilitating safer vendor interactions.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 13 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Why Your IAM Program Needs a Target Operating Model]]></title>
			<link>https://www.kuppingercole.com/watch/iam-program-target-operating-model</link>
			<guid>https://www.kuppingercole.com/watch/iam-program-target-operating-model</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">Is your IAM strategy focused too much on tools? In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth and Patrick Teichmann, Lead Advisor at KuppingerCole, dive into one of the most common pitfalls organizations face: starting IAM projects with the wrong priorities.</p>
<p>They explore how a Target Operating Model (TOM) helps define why and how your IAM should work before deciding on technology. Patrick shares insights from real projects, explaining how to align business goals, processes, and governance to achieve long-term success.</p>
<p><strong>Key Topics Covered:</strong></p>
<p>✅ Why IAM projects often fail due to tool-first thinking<br />✅ How a Target Operating Model sets the foundation for IAM success<br />✅ The role of governance, people, and processes in effective IAM<br />✅ Real-world examples of aligning strategy and technology<br />✅ How to evaluate tools after defining your IAM capabilities</p>
<p></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/iam-program-target-operating-model"><img src="https://www.kuppingercole.com//videothumb/iam-program-target-operating-model/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Fri, 10 Oct 2025 15:30:00 +0200</pubDate>
			<title><![CDATA[Mastering Non-Human Identity Governance for Enhanced Security and Efficiency]]></title>
			<link>https://www.kuppingercole.com/blog/kuppinger/mastering-non-human-identity-governance-for-enhanced-security-and-efficiency</link>
			<guid>https://www.kuppingercole.com/blog/kuppinger/mastering-non-human-identity-governance-for-enhanced-security-and-efficiency</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p><p>In today's digital landscape, the effective management of Non-Human Identities (NHIs) is indispensable for organizations striving for robust cybersecurity and operational excellence. NHIs&mdash;encompassing devices, workloads, service accounts, and AI agents&mdash;demand distinct management strategies that align with their unique characteristics and roles within our IT infrastructures.</p>
<p>Our latest advisory note delves into the strategic framework necessary to achieve comprehensive governance of NHIs. By leveraging a refined Capability Maturity Model (CMM) approach, organizations can navigate their way from foundational practices to advanced identity management. This model emphasizes the integration of key lifecycle stages such as provisioning, rotation, and decommissioning with continuous monitoring and compliance checks.</p>
<p>To actualize this framework, robust technological integration is paramount. Deploying specialized NHI management solutions, alongside Enterprise Secrets Management tools, PAM, and CIEM solutions, establishes a fortified foundation for identity governance. Moreover, the seamless integration with Identity Governance and Administration (IGA) systems and CI/CD pipelines ensures that security measures are inherently embedded within development and operational workflows.</p>
<p>Empowering organizations with the right blend of organizational structure, policies, processes, and advanced tools facilitates not only the secure management of NHIs but also drives operational agility and compliance. Exploring the full potential of NHI governance enables enterprises to confidently secure their digital environments while fostering innovation and growth in a rapidly evolving technological landscape.</p>
<p>We invite you to explore our comprehensive advisory note to uncover detailed insights and actionable steps towards mastering NHI governance in your enterprise.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Nitish Deshpande</dc:creator>			<pubDate>Fri, 10 Oct 2025 15:28:52 +0200</pubDate>
			<title><![CDATA[Omada Identity Cloud]]></title>
			<link>https://www.kuppingercole.com/research/ev81272/omada-identity-cloud</link>
			<guid>https://www.kuppingercole.com/research/ev81272/omada-identity-cloud</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Nitish Deshpande</a></p>Explore how Omada Identity Cloud revolutionizes identity governance by integrating lifecycle management, dynamic roles, and AI-driven insights into a cloud-native platform. Discover how this system enhances agility, automates compliance, and bridges legacy infrastructures, offering a future-ready solution for enterprises seeking robust governance frameworks.							]]></description>
		</item>
				<item>
						<pubDate>Fri, 10 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Stop Over Privileged Access in M365 with Virtual Tenant Segmentation]]></title>
			<link>https://www.kuppingercole.com/watch/microsoft-365-tenant-segmentation</link>
			<guid>https://www.kuppingercole.com/watch/microsoft-365-tenant-segmentation</guid>
			<description><![CDATA[ <p>Over 90% of organizations grant excessive administrative privileges in Microsoft 365, creating a sprawling attack surface that puts your entire digital infrastructure at risk. Microsoft 365 holds the keys to your digital kingdom, but today's privilege model leaves too many doors wide open.</p>
<p>Excessive administrative access across tenants creates risk vectors ripe for human error, insider misuse, and compliance failure. As hybrid work accelerates and insider threats surge by 44% year-over-year, the urgency to enforce least privilege across the Microsoft cloud stack has never been greater.</p>
<p>Emerging technologies and automated policy enforcement now make it possible to implement precision access controls in Microsoft 365 and Entra. By segmenting responsibilities and limiting access to just enough, organizations can dramatically reduce attack surfaces while maintaining productivity.</p>
<p><strong>Functional access models</strong> offer a proven path to replace standing privileges with secure, <strong>task-specific automation</strong> that eliminates human error and reduces blast radius.</p>
<p><strong>Jonathan Care, Lead Analyst at KuppingerCole</strong> brings over 15 years of enterprise security analysis to explore the broader implications of privilege mismanagement in the modern enterprise. He discusses how identity-based attacks exploit privilege sprawl, highlight emerging trends in insider threat evolution, and explain why automation and governance must underpin any zero-trust privilege strategy.</p>
<p><strong>Rob Edmondson, Senior Director of Product Marketing at CoreView, and Siam Rochanavichit, Solutions Architect</strong>&nbsp;demonstrate practical applications of least privilege principles. They show how to replace privileged access with task-specific automation, virtually segment tenants, remove excessive permissions, build a sustainable privilege management program that scales across complex cloud environments, and provide a hands-on demo of these principles in action.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/microsoft-365-tenant-segmentation"><img src="https://www.kuppingercole.com//videothumb/microsoft-365-tenant-segmentation/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Thu, 09 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Modernizing Authorization: Dynamic Authorization Driven By Policies]]></title>
			<link>https://www.kuppingercole.com/watch/modernizing-authorization</link>
			<guid>https://www.kuppingercole.com/watch/modernizing-authorization</guid>
			<description><![CDATA[ <p>Organizations managing access across hybrid IT landscapes increasingly find static entitlements insufficient for today&rsquo;s dynamic and risk-aware requirements. Policy-Based Access Management (PBAM) offers real-time, attribute-driven access decisions based on user context, improving security and reducing complexity.</p>
<p>This webinar will explore how PBAM supports centralized policy control, and compliance alignment. While legacy integration remains an issue, PBAM is becoming essential in Zero Trust strategies and modern enterprise authorization frameworks.</p>
<p data-start="0" data-end="264"><strong>Key Take aways:</strong></p>
<ul>
<li>PBAM provides a scalable, flexible approach to modern access control challenges.</li>
<li>Real-time policy enforcement enhances security and reduces static dependency.</li>
<li>Organizations benefit from PBAM's centralized management system across platforms.</li>
<li>Implementing PBAM allows for adaptive access decisions through attributes.</li>
<li>The PBAM market supports hybrid, multi-cloud, and legacy integrations, critical for modernization.</li>
</ul>
<p>In this webinar, Nitish Deshpande, Research Analyst at KuppingerCole Analysts will identify the key use cases, challenges, and required capabilities in modern authorization platforms. He will also dive deeper into difference between cloud native and traditional policy models, and the importance of multi-speed approach. Nitish will also provide an overview of the results from the latest Leadership Compass on Policy Based Access Management.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/modernizing-authorization"><img src="https://www.kuppingercole.com//videothumb/modernizing-authorization/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Warwick Ashford</dc:creator>			<pubDate>Wed, 08 Oct 2025 12:49:47 +0200</pubDate>
			<title><![CDATA[Secure Remote Access for OT/ICS]]></title>
			<link>https://www.kuppingercole.com/research/lc81027/secure-remote-access-for-ot/ics</link>
			<guid>https://www.kuppingercole.com/research/lc81027/secure-remote-access-for-ot/ics</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Warwick Ashford</a></p>The KuppingerCole Leadership Compass evaluates Secure Remote Access (SRA) solutions for Operational Technology (OT) and Industrial Control Systems (ICS), highlighting the need for secure remote connectivity in industrial environments. The report assesses products on access control, protocol isolation, legacy system support, compliance, and integration with cybersecurity infrastructure. Vendors combine Zero Trust access models, behavioral analytics, and high-availability features to meet sector-specific and regulatory demands.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 08 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Will AI Agents Be the Foundation of the Next Security Revolution?]]></title>
			<link>https://www.kuppingercole.com/watch/agentic-ai-security-revolution</link>
			<guid>https://www.kuppingercole.com/watch/agentic-ai-security-revolution</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">Are AI agents the future of cybersecurity or a threat to human expertise? In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth talks with Alexei Balaganski, Lead Analyst and CTO at KuppingerCole, about the rise of AI agents and their potential to reshape the cybersecurity landscape.</p>
<p>They explore how autonomous AI systems could fill the cyber skills gap, automate incident response, and even act as digital coworkers in SOC environments. But how far can we trust them&mdash;and will humans still have a place in the loop?</p>
<p>Key topics covered:</p>
<p>✅ What AI agents really are&mdash;and how they differ from traditional automation<br />✅ The role of AI in SOCs, incident response, and threat detection<br />✅ Can AI agents help close the cybersecurity skills gap?<br />✅ Risks of rogue or &ldquo;hallucinating&rdquo; AI systems<br />✅ Why access governance and identity management are critical for AI agents<br />✅ The future of cybersecurity jobs in the age of automation</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/agentic-ai-security-revolution"><img src="https://www.kuppingercole.com//videothumb/agentic-ai-security-revolution/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Anne Bailey</dc:creator>			<pubDate>Mon, 06 Oct 2025 09:54:15 +0200</pubDate>
			<title><![CDATA[Identity Verification]]></title>
			<link>https://www.kuppingercole.com/research/bc81044/identity-verification</link>
			<guid>https://www.kuppingercole.com/research/bc81044/identity-verification</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Anne Bailey</a></p>In consumer-oriented sectors, companies face heightened identity fraud threats while balancing user experience and regulatory demands. Generative AI amplifies fraudulent tactics, necessitating robust yet seamless identity solutions. Effective strategies leverage document and biometric verification, maintaining compliance with KYC/AML requirements, and cater to global user bases. Automating and integrating these processes enhances both security and customer satisfaction.							]]></description>
		</item>
				<item>
						<pubDate>Fri, 03 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Artificial Intelligence Rewrites the Rules of B2B Identity Access]]></title>
			<link>https://www.kuppingercole.com/watch/rules-of-b2b</link>
			<guid>https://www.kuppingercole.com/watch/rules-of-b2b</guid>
			<description><![CDATA[ <p>Rapid advances in artificial intelligence are reshaping how organizations handle digital identities. Federated identities, multi-tenancy, and dynamic trust boundaries demand smarter, scalable solutions. Organizations must balance security with seamless access or risk inefficiency and exposure.</p>
<p>Modern IAM leverages AI and machine learning to automate onboarding, detect anomalies and enforce adaptive authentication. By integrating AI-driven decisioning, businesses can secure APIs, streamline partner access, and future-proof their identity infrastructure.</p>
<p>John Tolbert, Director of Research and a Lead Analyst at KuppingerCole, will explore how AI is redefining IAM paradigms. He&rsquo;ll analyze emerging threats, ethical considerations, and architectural best practices for resilient B2B identity frameworks.</p>
<p>Jacob Ideskog, CTO at Curity, will showcase how Curity&rsquo;s identity platform is applying AI to streamline onboarding, strengthen policy enforcement, and intelligently manage access across complex B2B environments. He&rsquo;ll share real-world implementations, discuss lessons learned, and offer a vision for how AI can empower enterprises to scale trust securely and efficiently.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/rules-of-b2b"><img src="https://www.kuppingercole.com//videothumb/rules-of-b2b/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Thu, 02 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Securing Trust: The Future of Identity Verification]]></title>
			<link>https://www.kuppingercole.com/watch/identity-verification</link>
			<guid>https://www.kuppingercole.com/watch/identity-verification</guid>
			<description><![CDATA[ <p>Identity verification is rapidly evolving from manual checks to advanced, remote-first solutions. With fraud on the rise and digital services expanding, organizations must meet high compliance standards while offering seamless onboarding. This webinar unpacks market dynamics, new technologies like AI-driven face matching, and the growing importance of identity verification across sectors from finance to social media.</p>
<p>In this webinar, Alejandro Leal explores the transformative shifts in the identity verification market, sharing insights from KuppingerCole's latest Leadership Compass. Drawing on vendor evaluations and industry use cases, he highlights how identity verification supports secure onboarding, fraud prevention, and compliance across diverse industries. We also discuss the road ahead, as organizations prepare for the paradigm shift to decentralized, user-held digital identities.</p>
<p>Key Takeaways:</p>
<ul>
<li>Learn how remote identity verification combats modern fraud</li>
<li>Understand the latest AI-powered document and biometric technologies</li>
<li>Discover how digital onboarding aligns with evolving compliance mandates</li>
<li>Explore market trends toward user-held digital identities</li>
<li>Gain insights into vendor selection for global identity verification strategies</li>
</ul>
<p></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/identity-verification"><img src="https://www.kuppingercole.com//videothumb/identity-verification/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Mike Small</dc:creator>			<pubDate>Wed, 01 Oct 2025 15:05:35 +0200</pubDate>
			<title><![CDATA[​​Why SaaS Security Posture Management Matters - Three Real Life Examples​]]></title>
			<link>https://www.kuppingercole.com/blog/small/why-saas-security-posture-management-matters-three-real-life-examples</link>
			<guid>https://www.kuppingercole.com/blog/small/why-saas-security-posture-management-matters-three-real-life-examples</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Mike Small</a></p><h2>How SSPM Could Have Prevented Three Recent Incidents&nbsp;</h2>
<p>As Software as a Service (SaaS) security incidents surge, from token theft to data leakage and phishing attacks, organizations need SaaS Security Posture Management (SSPM) to detect misconfigurations, prevent unauthorized access, and reduce third-party integration risks. In this blog I will examine three cybersecurity incidents that occurred in 2025 and based on published information, I will explore how SSPM tools could have helped SaaS user organizations to reduce their impact or prevent them altogether.&nbsp;</p>
<p>Using SaaS applications has introduced new risks, many of which stem not from advanced malware or state-sponsored actors, but from poorly managed SaaS configurations, excessive permissions, and the absence of visibility. SSPM solutions do not replace good cyber security practices, however they do support their enforcement and provide visibility into weaknesses in their implementation.&nbsp;</p>
<p><img src="/pics/Why_SaaS_Security_Posture_Management_Matters.png" alt="" /></p>
<h2>Commvault Metallic &amp; Microsoft 365 Secret Leakage&nbsp;</h2>
<p><strong>Incident Overview</strong></p>
<p>According to the <a href="https://www.cisa.gov/news-events/alerts/2025/05/22/advisory-update-cyber-threat-activity-targeting-commvaults-saas-cloud-application-metallic">US CISA</a>, in May 2025, attackers exploited a zero-day vulnerability (CVE-2025-3928) in Commvault&rsquo;s web server, allowing attackers to extract OAuth tokens and client secrets used to access customer Microsoft 365 tenants via Commvault's SaaS backup offering, Metallic.&nbsp;</p>
<p>The breach originated from Commvault&rsquo;s infrastructure, but the stolen credentials were used to access Microsoft 365 data from within the affected customer environments. This made the blast radius dependent on how the customers had configured M365 and governed their integrations.&nbsp;</p>
<p><strong>How Customer-Side SSPM Could Have Helped&nbsp;</strong></p>
<p>SSPM could not have blocked the original server-side vulnerability in Commvault&rsquo;s infrastructure. It also would not detect token theft occurring within the Commvault environment (that would be Commvault&rsquo;s responsibility). But once the stolen secrets were used against the customer&rsquo;s own SaaS estate, SSPM becomes the last line of defense.&nbsp;&nbsp;</p>
<ul>
<li>SSPM provides visibility into third-party SaaS integrations. This includes backup providers like Metallic.&nbsp;&nbsp;</li>
<li>It surfaces the scope of granted OAuth permissions and alerts if the scope is too broad or inconsistent with organizational policy. It tracks and analyzes API calls made using OAuth tokens (including those made on behalf of sanctioned apps) and detects suspicious behavior patterns.&nbsp;&nbsp;</li>
<li>It also identifies Non-Human Identities (NHIs) with high privilege, orphaned apps (for example an app no longer managed by any admin), overprivileged apps relative to their actual activity and apps with excessive delegated permissions.&nbsp;</li>
</ul>
<h2>Zapier Code Repository Breach</h2>
<p><strong>Incident Overview</strong></p>
<p>According to the <a href="https://www.theverge.com/news/622026/zapier-data-breach-code-repositories"><span class="s1">Verge</span></a>, in February 2025 an unauthorized user accessed internal Zapier code repositories containing debugging artifacts, some of which included sensitive customer data. Although core production systems were unaffected, the presence of regulated data in developer environments, and a lack of segmentation or Data Leak Prevention (DLP) controls presented a significant data exposure risk. This is an example where SSPM could detect and control insecure handling and storage of sensitive data within dev pipelines (CI/CD, version control, and SaaS-based code management tools).&nbsp;</p>
<p><strong>How Customer-Side SSPM Could Have Helped&nbsp;</strong></p>
<p>SSPM would not prevent Zapier&rsquo;s own internal failure to segment its customer data from its dev environments, which is a vendor-side DevSecOps issue. However, if an organization were storing its own customer data in SaaS-based developer tools, SSPM could help catch that before a breach occurs.&nbsp;</p>
<ul>
<li>SSPM includes DLP capabilities that can help to prevent customer data from being stored in dev or test environments, even if accidentally included in debugging logs or payload samples.&nbsp;&nbsp;</li>
<li>DLP can also identify and remove shadow data and data residues in places not covered by standard data governance controls.&nbsp;&nbsp;</li>
<li>It provides visibility into which SaaS services are used by developers, including those that may not be officially sanctioned. It also scans the configurations of SaaS Dev apps like GitHub for lack of 2FA or SSO as well as for overprivileged accounts.&nbsp;</li>
</ul>
<h2>ShinyHunters &amp; Salesforce Data Loader Phishing<strong>&nbsp;</strong></h2>
<p><strong>Incident Overview&nbsp;</strong></p>
<p>According to the <a href="https://www.ic3.gov/CSA/2025/250912.pdf"><span class="s1">FBI</span></a>, since October 2024, threat actors from the group UNC6040 (ShinyHunters) have been executing a voice phishing (vishing) campaign impersonating internal IT support. They trick users into downloading and installing a &ldquo;trojan&rdquo; version of Salesforce Data Loader, a legitimate Salesforce tool used for mass importing and exporting CRM data. This malicious version gives attackers access to large volumes of sensitive data, including customer records and account information.&nbsp;</p>
<p><strong>How Customer-Side SSPM Could Have Helped&nbsp;</strong></p>
<p>SSPM cannot stop social engineering, particularly when attackers impersonate internal IT staff through phone calls or emails and convince users to take malicious actions (e.g., installing a compromised Data Loader). While the attack vector was social engineering, the damage was enabled by weak access controls and lack of oversight within the Salesforce environment. This is where SSPM can help.&nbsp;</p>
<ul>
<li>SSPM detection of abnormal data export activity. Even if the malicious data loader were installed, SSPM could have detected suspicious API behavior and triggered real-time alerts or automated responses (via SOAR).&nbsp;</li>
<li>Control over SaaS administrative tools and permissions. This can help to prevent users from having unnecessary access to tools that can extract large datasets.&nbsp;</li>
<li>Third-party tool and OAuth app risk governance can alert security teams if a new or modified version of data loader is used, especially one that deviates from normal behavior or permission scope.</li>
<li>Policy-based restrictions for high-risk operations can force administrative oversight or MFA re-verification before mass exports.</li>
</ul>
<h2>Opinion</h2>
<p>Each of these incidents illustrates a common problem: an absence of continuous, risk-aware oversight of SaaS configurations, identities, and data flows. SSPM bridges this gap by delivering cross-cloud policy enforcement, entitlement risk detection, data protection, app governance, and threat detection.</p>
<p>Organizations using SaaS applications for business purposes must ensure that these are deployed and used in a way that meets their cyber risk appetite and regulatory obligations. Organizations must set appropriate cyber-security policies around the use of SaaS and <a href="https://www.kuppingercole.com/research/lb80815/cyber-hygiene-the-foundation-for-cyber-resilience"><span>implement good cyber hygiene</span></a>.&nbsp; SSPM solutions provide capabilities to measure and improve the achievement of these objectives across multi-cloud SaaS applications.</p>
<p>Our <a href="https://www.kuppingercole.com/research/bc81037/saas-security-posture-management"><span>Buyers Compass SaaS Security Posture Management</span></a> provides guidance to help organizations select the SSPM solution that is most appropriate for their use cases.</p>
<p>To explore best practices in SaaS and Cloud security, join us at <a href="https://www.kuppingercole.com/events/iccid2025"><span>Identity-Centric Cybersecurity Impact Day 2025</span></a> in Frankfurt November 6<sup>th</sup>, 2025.</p>							]]></description>
		</item>
				<item>
						<pubDate>Wed, 01 Oct 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Revealing the Weakest Links in B2B Identity and How to Fix Them]]></title>
			<link>https://www.kuppingercole.com/watch/digital-trust-tolerate-weak-identity</link>
			<guid>https://www.kuppingercole.com/watch/digital-trust-tolerate-weak-identity</guid>
			<description><![CDATA[ <p>Organizations obsess over stopping cyberattacks, yet often ignore the quieter, daily failures that damage trust even more. Slow onboarding, endless login issues, and delayed offboarding don&rsquo;t just frustrate users, they corrode confidence between businesses and stall collaboration. The real risk to digital trust isn&rsquo;t always the headline breach, but the persistent identity friction no one talks about.</p>
<p>The path forward demands rethinking how we manage external identities. Seamless onboarding, adaptive authentication, and immediate access revocation are the baseline for trust. Companies that fail to modernize their third-party identity practices risk losing not just efficiency, but credibility in the digital ecosystem.</p>
<p>John Tolbert, Director of Research and Lead Analyst at KuppingerCole Analysts, will reveal findings from the 2025 Digital Trust Index &ndash; Third-Party Edition. He will spotlight the most fragile points in the identity lifecycle, challenge outdated practices, and share data-backed recommendations on how organizations can rebuild confidence through consistency and accountability.</p>
<p>Jose Caso, Product Marketing Manager at Thales and Marco Venuti, B2B IAM Business Owner will show how the OneWelcome Identity Platform turns these principles into practice. They will discuss how delegated user management, adaptive access control, and externalized authorization eliminate friction while strengthening security, and why organizations that don&rsquo;t adopt these measures risk falling behind in trust-driven ecosystems.</p>
<p></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/digital-trust-tolerate-weak-identity"><img src="https://www.kuppingercole.com//videothumb/digital-trust-tolerate-weak-identity/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Tue, 30 Sep 2025 08:44:35 +0200</pubDate>
			<title><![CDATA[Nov 13, 2025: Transforming APIs from Endpoints to Business Products]]></title>
			<link>https://www.kuppingercole.com/events/endpoints-to-business-products</link>
			<guid>https://www.kuppingercole.com/events/endpoints-to-business-products</guid>
			<description><![CDATA[ APIs are the nervous system of modern enterprises, or at least they should be. In reality, many organizations still treat them as side projects, exposing services and data without a coherent plan. The result is growth on one side and systemic risks on the other, sometimes powerful enough to derail the very innovation APIs were meant to deliver.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 29 Sep 2025 14:42:25 +0200</pubDate>
			<title><![CDATA[Nov 20, 2025: Beyond the Vault: Closing the Gaps PAM Left Behind]]></title>
			<link>https://www.kuppingercole.com/events/beyond-the-vault</link>
			<guid>https://www.kuppingercole.com/events/beyond-the-vault</guid>
			<description><![CDATA[ How many admin passwords are floating around in your organization right now? How many hard-coded secrets live inside scripts or CI/CD pipelines? For most enterprises, the answer is “too many.” Traditional PAM tools promised control, but in practice they’re patchworks of code that don’t cover the realities of cloud, SaaS and DevOps.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 29 Sep 2025 10:05:25 +0200</pubDate>
			<title><![CDATA[Nov 06, 2025: Closing the Gaps in Zero Trust]]></title>
			<link>https://www.kuppingercole.com/events/beyond-zero-trust</link>
			<guid>https://www.kuppingercole.com/events/beyond-zero-trust</guid>
			<description><![CDATA[ Zero Trust promised to secure everything, yet attackers still get through. IAM validates only the login, SOCs watch devices, not humans. Phishing-resistant bypasses, session hijacking, and insider threats thrive in this blind spot, leaving enterprises with a false sense of security. The human endpoint remains the weakest link.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 29 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[From Breach Fatigue to Resilient Architecture: Rethinking Data Trust]]></title>
			<link>https://www.kuppingercole.com/watch/breach-fatigue-to-resilient-architecture</link>
			<guid>https://www.kuppingercole.com/watch/breach-fatigue-to-resilient-architecture</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []"><strong>Are we already living in a post-data privacy world?</strong></p>
<p>Breaches are everywhere, data is constantly being leaked, and GDPR fines haven&rsquo;t stopped surveillance capitalism or shady data brokers. In this episode of the Analyst Chat, Matthias Reinwarth is joined by Mike Small and Jonathan Care to explore whether privacy still has meaning &mdash; or if resilience and risk management are the only ways forward.</p>
<p>They debate:</p>
<p>✅ Is privacy truly dead, or just evolving?<br />✅Why regulations like GDPR often miss the mark ⚖️<br />✅How cyber resilience is becoming more critical than &ldquo;traditional&rdquo; privacy<br />✅The personal, societal, and legal dimensions of privacy<br />✅What organizations (and individuals) <em>can</em> still do to protect data</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/breach-fatigue-to-resilient-architecture"><img src="https://www.kuppingercole.com//videothumb/breach-fatigue-to-resilient-architecture/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 26 Sep 2025 12:16:52 +0200</pubDate>
			<title><![CDATA[Dec 03, 2025: Securing Remote Access in OT and ICS: Beyond VPNs]]></title>
			<link>https://www.kuppingercole.com/events/securing-remote-access</link>
			<guid>https://www.kuppingercole.com/events/securing-remote-access</guid>
			<description><![CDATA[ Industrial operations depend on secure remote connectivity for diagnostics, updates, and third-party support. Yet legacy hardware, proprietary protocols, and safety-critical systems make Operational Technology (OT) environments and Industrial Control Systems (ICS) especially vulnerable. Secure Remote Access (SRA) platforms address these risks with policy-enforced, monitored connections that enable resilience, regulatory compliance, and safer collaboration across energy, manufacturing, transportation, and utilities.							]]></description>
		</item>
				<item>
						<pubDate>Fri, 26 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Outsmart Cybercriminals by Thinking Like One]]></title>
			<link>https://www.kuppingercole.com/watch/outsmart-cybercriminals</link>
			<guid>https://www.kuppingercole.com/watch/outsmart-cybercriminals</guid>
			<description><![CDATA[ <p>Most security strategies still operate like it&rsquo;s 2015. They build higher walls, patch faster, and hope attackers lose interest. But today&rsquo;s adversaries are persistent. They continuously map and aim to exploit your attack surface. If you only play defense, you are letting them dictate the pace. ASM shifts the advantage by proactively discovering, monitoring, and reducing exposures before they can be exploited, forcing attackers to work harder for every inch.</p>
<p>By adopting an attacker&rsquo;s mindset, you stop waiting for the breach and start finding your own weak spots before they do. Attack Surface Management not only identifies what is exposed but also provides a dynamic and continuously updated view of your digital footprint, highlighting exploitable paths and unknown assets.</p>
<p>Think like the enemy, move like the enemy, and neutralize them before they even find you.</p>
<p>Osman Celik, a Research Analyst at KuppingerCole, is the author of the ASM Leadership Compass. He has been working on why proactive cybersecurity solutions and strategies must replace reactive ones. He will share his insights on how ASM solutions help you stay one step ahead of cybercriminals. He will also explain why threat intelligence is essential to an ASM solution.</p>
<p>Tabatha von Koelichen, Regional Sales Director for DACH and Central Europe and Harald Roeder, Senior Solutions Engineer at Censys and will show exactly how to operationalize attacker-first thinking using Censys&rsquo; global Internet intelligence. He will dissect real breaches to reveal where defenders missed their chance, demonstrate live threat hunting techniques, and walk through how Censys uncovers assets you didn&rsquo;t even know existed because if you don&rsquo;t know about them, attackers already do. <br /><strong><br /></strong></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/outsmart-cybercriminals"><img src="https://www.kuppingercole.com//videothumb/outsmart-cybercriminals/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Thu, 25 Sep 2025 13:01:31 +0200</pubDate>
			<title><![CDATA[NHI and CIEM: Beyond Point Solutions towards Strategy]]></title>
			<link>https://www.kuppingercole.com/research/an82005/nhi-and-ciem-beyond-point-solutions-towards-strategy</link>
			<guid>https://www.kuppingercole.com/research/an82005/nhi-and-ciem-beyond-point-solutions-towards-strategy</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>In the age of digital transformation, the management of non-human identities (NHI) has become a strategic necessity. These identities, spanning workloads, service accounts, IoT devices, and AI agents, are critical to leveraging modern technological ecosystems. However, they present unique challenges that traditional identity and access management frameworks are ill-equipped to address. This advisory note offers a comprehensive exploration of the NHI landscape, emphasizing integrated strategies for effective management. Building on insights into the synergies between NHI management and Cloud Infrastructure Entitlement Management (CIEM), this document provides actionable guidance for navigating this complex domain.							]]></description>
		</item>
				<item>
			<dc:creator>Jonathan Care</dc:creator>			<pubDate>Thu, 25 Sep 2025 10:15:08 +0200</pubDate>
			<title><![CDATA[Third-Party Risk Reality Check: A Practical Tabletop Exercise for Supply Chain Disruptions]]></title>
			<link>https://www.kuppingercole.com/blog/care/third-party-risk-reality-check-a-practical-tabletop-exercise-for-supply-chain-disruptions</link>
			<guid>https://www.kuppingercole.com/blog/care/third-party-risk-reality-check-a-practical-tabletop-exercise-for-supply-chain-disruptions</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Jonathan Care</a></p><h2 class="p1">Executive Summary&nbsp;</h2>
<p class="p2">The recent cyberattack affecting major European airports through a third-party check-in provider serves as a stark reminder of our interconnected digital dependencies. When Brussels, Berlin, and Heathrow airports experienced simultaneous disruptions, the root cause wasn't a direct attack on their infrastructure&mdash;it was a single point of failure in their shared supply chain. This incident provides a perfect template for organizations to stress-test their own third-party risk response capabilities through a focused 60-minute tabletop exercise.&nbsp;</p>
<h2 class="p1">The Wake-Up Call: When Suppliers Become Single Points of Failure&nbsp;</h2>
<p class="p2">The airport incident follows a disturbingly familiar pattern: a critical third-party platform experiences a cyber-related outage, and every downstream organization scrambles to maintain operations. The cascading impact forces manual workarounds, degrades service quality, and triggers a complex web of communication challenges across vendors, partners, and customers.&nbsp;</p>
<p class="p2">This scenario isn't unique to aviation. Every organization relying on SaaS platforms, managed service providers, or cloud infrastructure faces similar exposure. The question isn't whether such an incident could affect your organization&mdash;it's whether you're prepared to respond effectively when it does.&nbsp;</p>
<h2 class="p1">A Practical Tabletop Exercise Framework&nbsp;</h2>
<p class="p2">Based on the European airport incident, here's a structured tabletop exercise that any organization can deploy to test their third-party incident response capabilities.&nbsp;</p>
<h2 class="p1">Scenario Foundation&nbsp;</h2>
<p class="p2"><strong>Core Premise:</strong> A critical third-party platform essential to your operations experiences a major outage with unknown recovery timeline. Initial indicators suggest a cyber-related disruption, potentially ransomware, at the provider level.&nbsp;</p>
<p class="p2"><strong>Threat Actor Profile:</strong> Attribution remains pending, but operational indicators align with criminal ransomware groups targeting high-value service providers for maximum downstream impact. The vendor confirms a "cyber-related disruption" but provides limited technical details due to ongoing investigation.&nbsp;</p>
<h2 class="p1">Exercise Objectives&nbsp;</h2>
<ol class="ol1">
<li class="li2"><strong>Rapid Crisis Activation:</strong> Test the speed and effectiveness of incident and crisis management protocols, including establishment of joint vendor coordination bridges&nbsp;</li>
<li class="li2"><strong>Operational Resilience:</strong> Evaluate ability to maintain critical services in degraded mode while managing capacity constraints&nbsp;</li>
<li class="li2"><strong>Stakeholder Management:</strong> Assess regulatory reporting readiness and crisis communication coordination across multiple stakeholders&nbsp;</li>
</ol>
<h2 class="p1">Three-Phase Exercise Structure<strong>&nbsp;</strong></h2>
<p class="p1"><strong>Phase 1: Detection, Activation, and Escalation (Minutes 0-20)&nbsp;</strong></p>
<p class="p2"><strong>Scenario Injects:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>08:10: Vendor status page switches to "major outage affecting all regions"&nbsp;</li>
<li class="li2"><span class="s1"></span>08:15: Support tickets triple as downstream impacts cascade&nbsp;</li>
<li class="li2"><span class="s1"></span>08:25: Partner organization executive extends invitation to vendor's emergency cross-company coordination bridge&nbsp;</li>
</ul>
<p class="p2"><strong>Critical Decision Points:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Who has authority to declare a crisis, and what specific triggers mandate escalation?&nbsp;</li>
<li class="li2"><span class="s1"></span>Who owns the vendor relationship during crisis mode, and how do they balance information gathering with operational response?&nbsp;</li>
<li class="li2"><span class="s1"></span>What immediate decisions must be made before full situational awareness is achieved?&nbsp;</li>
</ul>
<p class="p2"><strong>Success Metrics:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Time from detection to crisis declaration&nbsp;</li>
<li class="li2"><span class="s1"></span>Time to establish unified command structure&nbsp;</li>
<li class="li2"><span class="s1"></span>Clarity of initial resource allocation decisions&nbsp;</li>
</ul>
<p class="p1"><strong>Phase 2: Continuity of Critical Processes (Minutes 20-40)&nbsp;</strong></p>
<p class="p2"><strong>Scenario Injects:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Manual workaround procedures sustain only 35% of normal throughput&nbsp;</li>
<li class="li2"><span class="s1"></span>Contractual SLA breach projected within 90 minutes without prioritization&nbsp;</li>
<li class="li2"><span class="s1"></span>Vendor offers partial service restoration with acknowledged stability risks&nbsp;</li>
</ul>
<p class="p2"><strong>Critical Decision Points:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>What constitutes the minimum viable capacity for each critical business process?&nbsp;</li>
<li class="li2"><span class="s1"></span>Which offline procedures or alternate workflows exist, and who can authorize their activation?&nbsp;</li>
<li class="li2"><span class="s1"></span>How will extended operations be staffed to prevent team burnout during multi-day incidents?&nbsp;</li>
</ul>
<p class="p2"><strong>Success Metrics:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Documented minimum viable capacity thresholds&nbsp;</li>
<li class="li2"><span class="s1"></span>Time to activate alternative processes&nbsp;</li>
<li class="li2"><span class="s1"></span>Resource sustainability planning for extended incidents&nbsp;</li>
</ul>
<p class="p1"><strong>Phase 3: Reporting and Communications (Minutes 40-60)&nbsp;</strong></p>
<p class="p2"><strong>Scenario Injects:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Regulatory early warning notification deadline approaches&nbsp;</li>
<li class="li2"><span class="s1"></span>Key customers demand detailed explanations and mitigation timelines&nbsp;</li>
<li class="li2"><span class="s1"></span>Social media speculation incorrectly attributes outage to your systems rather than the vendor&nbsp;</li>
</ul>
<p class="p2"><strong>Critical Decision Points:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>What specific thresholds and timers govern regulatory notifications, and who provides final approval?&nbsp;</li>
<li class="li2"><span class="s1"></span>What single-paragraph external statement accurately explains the situation while maintaining stakeholder confidence?&nbsp;</li>
<li class="li2"><span class="s1"></span>How do we ensure message alignment across vendor, partners, and our own communications?&nbsp;</li>
</ul>
<p class="p2"><strong>Success Metrics:</strong>&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Regulatory notification decision timeline&nbsp;</li>
<li class="li2"><span class="s1"></span>Message consistency across channels&nbsp;</li>
<li class="li2"><span class="s1"></span>Speed of social media misconception correction&nbsp;</li>
</ul>
<h2 class="p1">Key Takeaways and Implementation Guidance&nbsp;</h2>
<p class="p2">This tabletop exercise addresses the three fundamental questions leadership needs answered before any third-party incident:&nbsp;</p>
<ol class="ol1">
<li class="li2"><strong>Who would we call?</strong> Clear escalation paths and vendor crisis contacts must be pre-established, not discovered during an incident.&nbsp;</li>
<li class="li2"><strong>How do we keep serving?</strong> Degraded mode operations and manual workarounds require advance planning and regular testing.&nbsp;</li>
<li class="li2"><strong>What do we say?</strong> Pre-drafted communication templates and clear approval chains prevent messaging delays when minutes matter.&nbsp;</li>
</ol>
<p class="p1"><strong>Scheduling for Success&nbsp;</strong></p>
<p class="p2">Run this exercise during normal business hours with key stakeholders present. The 60-minute investment will reveal critical gaps in third-party incident response capabilities before they're exposed during an actual crisis. Consider conducting this exercise quarterly, rotating through different critical vendors to build comprehensive response capabilities.&nbsp;</p>
<p class="p1"><strong>Beyond the Tabletop&nbsp;</strong></p>
<p class="p2">While this exercise provides valuable insights, organizations should complement it with:&nbsp;</p>
<ul class="ul1">
<li class="li2"><span class="s1"></span>Regular updates to vendor dependency mapping&nbsp;</li>
<li class="li2"><span class="s1"></span>Contractual reviews ensuring appropriate incident notification requirements&nbsp;</li>
<li class="li2"><span class="s1"></span>Technical controls monitoring third-party service health&nbsp;</li>
<li class="li2"><span class="s1"></span>Regular communication drills with critical vendors&nbsp;</li>
</ul>
<p class="p1"><strong>Ready or not, Take-off time approaches&nbsp;</strong></p>
<p class="p2">The European airport incident shows that third-party risks aren't just theoretical; they're real operational challenges that need practical preparation. This tabletop exercise turns a recent real-world event into concrete steps for better readiness. Organizations that spend 60 minutes on this exercise today may avoid hours or even days of chaos when their critical supplier faces inevitable disruptions tomorrow.&nbsp;</p>
<p class="p2">The question for every CISO, risk manager, and business continuity professional is simple: Will you be ready when your vendor's status page turns red?&nbsp;</p>							]]></description>
		</item>
				<item>
			<dc:creator>Jonathan Care</dc:creator>			<pubDate>Thu, 25 Sep 2025 08:56:23 +0200</pubDate>
			<title><![CDATA[Preventing Million-Dollar Fraud: Why ERP Security Must Move Beyond Access Controls]]></title>
			<link>https://www.kuppingercole.com/research/wp81282/preventing-million-dollar-fraud-why-erp-security-must-move-beyond-access-controls</link>
			<guid>https://www.kuppingercole.com/research/wp81282/preventing-million-dollar-fraud-why-erp-security-must-move-beyond-access-controls</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Jonathan Care</a></p>Unveil the hidden threats within your ERP systems. By understanding the limitations of traditional security and discovering Pathlock's unique solution, gain insights into transforming ERP security into a powerful business enabler. Unlock proactive transaction-level monitoring and real-world risk quantification that propels operational resilience and financial performance forward.							]]></description>
		</item>
				<item>
			<dc:creator>John Tolbert</dc:creator>			<pubDate>Thu, 25 Sep 2025 08:53:22 +0200</pubDate>
			<title><![CDATA[B2B CIAM in the Era of Agentic AI and NHI]]></title>
			<link>https://www.kuppingercole.com/research/wp81286/b2b-ciam-in-the-era-of-agentic-ai-and-nhi</link>
			<guid>https://www.kuppingercole.com/research/wp81286/b2b-ciam-in-the-era-of-agentic-ai-and-nhi</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">John Tolbert</a></p>Non-Human Identities and AI agents introduce unprecedented challenges in CIAM, demanding innovative security strategies. Explore how the rise of NHIs reshapes cybersecurity, requiring dynamic registration, real-time policy checks, and new standards such as the Model Context Protocol. Uncover how these elements converge with Zero Trust principles to fortify B2B identity management.							]]></description>
		</item>
				<item>
						<pubDate>Thu, 25 Sep 2025 08:49:14 +0200</pubDate>
			<title><![CDATA[Nov 18, 2025: Rethinking Identity Security for Enterprises in the Age of AI]]></title>
			<link>https://www.kuppingercole.com/events/rethinking-identity-security</link>
			<guid>https://www.kuppingercole.com/events/rethinking-identity-security</guid>
			<description><![CDATA[ AI has already slipped inside of enterprises. Employees are experimenting with generative tools, vendors are embedding AI features into platforms, and business units are spinning up AI agents without security sign-off. The result? A growing shadow workforce of non-human identities that few organizations even acknowledge, let alone govern.							]]></description>
		</item>
				<item>
						<pubDate>Thu, 25 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Unlock CIEM: Control Cloud Access Smarter]]></title>
			<link>https://www.kuppingercole.com/watch/unlock-ciem</link>
			<guid>https://www.kuppingercole.com/watch/unlock-ciem</guid>
			<description><![CDATA[ <p>Managing cloud entitlements across AWS, Azure, GCP, and SaaS is now one of the biggest challenges in cybersecurity. This webinar presents highlights from the latest KuppingerCole Leadership Compass on CIEM, showcasing the most capable and innovative vendors in this space. Learn how these solutions reduce cloud risk, enforce least privilege, and automate access decisions in real-time. Whether you're a CISO, cloud security architect, or IAM leader, this session will guide you toward better entitlement governance and cloud resilience.</p>
<p>In this session, Paul Fisher will walk through the key findings from the CIEM Leadership Compass 2025, including why CIEM is fast becoming essential for modern cloud security strategies. He will highlight standout vendors and what makes them leaders across product innovation, automation, and integration. Expect a deep dive into trends like ephemeral access, non-human identity control, and how AI is reshaping entitlement management. Whether you&rsquo;re evaluating vendors or planning your next move, this will give you a critical head start.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/unlock-ciem"><img src="https://www.kuppingercole.com//videothumb/unlock-ciem/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Osman Celik</dc:creator>			<pubDate>Wed, 24 Sep 2025 08:36:20 +0200</pubDate>
			<title><![CDATA[Web Application and API Protection (WAAP)]]></title>
			<link>https://www.kuppingercole.com/research/bc81050/web-application-and-api-protection-waap</link>
			<guid>https://www.kuppingercole.com/research/bc81050/web-application-and-api-protection-waap</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Osman Celik</a></p>Modern cybersecurity necessitates WAAP platforms to safeguard web applications and APIs from AI-driven threats, DDoS attacks, API abuse, and malicious bots. WAAPs outperform traditional WAFs by employing behavioral analysis, AI algorithms, and adaptive threat detection to mitigate vulnerabilities. They provide enhanced security, regulatory compliance, and API management capabilities critical for evolving digital infrastructures.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 24 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[What Security Teams Need from SOAR Now]]></title>
			<link>https://www.kuppingercole.com/watch/soar-now</link>
			<guid>https://www.kuppingercole.com/watch/soar-now</guid>
			<description><![CDATA[ <p>Security teams today face rising threats, alert fatigue, and a shortage of skilled analysts. At the same time, CISOs are under pressure to improve response times and reduce costs. To meet these demands, organizations are turning to Security Orchestration, Automation, and Response (SOAR) platforms, but not all SOAR solutions are created equal.</p>
<p>Modern SOAR is no longer just about incident response. With the infusion of generative AI and hyperautomation, SOAR has the potential to drive business-wide efficiency, extend beyond IT, and become a central nervous system for the modern Security Operations Center (SOC). But how do you distinguish real innovation from marketing hype?</p>
<p><strong>Alejandro Leal, Senior Analyst at KuppingerCole</strong>, will provide a strategic perspective on SOAR trends, including where AI is making a tangible impact, what hyperautomation really means in a SOC context, and how SOAR is evolving beyond cybersecurity use cases. He will also highlight what buyers should look for in a modern solution.</p>
<p><strong>Kevin Faulkner, Product Marketing Director at Fortinet</strong>, will explore how FortiSOAR fits into this shifting landscape. He will share real-world customer profiles, explain key use cases, and outline FortiSOAR&rsquo;s value for managed service providers. Expect insights on embedded vs. stand-alone automation and where SOAR is headed next.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/soar-now"><img src="https://www.kuppingercole.com//videothumb/soar-now/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Tue, 23 Sep 2025 15:18:46 +0200</pubDate>
			<title><![CDATA[Dec 02, 2025: Elevate Your Enterprise With Intelligent Access Management]]></title>
			<link>https://www.kuppingercole.com/events/intelligent-access-management</link>
			<guid>https://www.kuppingercole.com/events/intelligent-access-management</guid>
			<description><![CDATA[ Identity and Access Management is at a crossroads. SAP Identity Management (IdM) is approaching its end of life, yet many organizations still pour money into patchwork fixes, delaying the inevitable. Every year of hesitation means rising costs, mounting risks, and shrinking options. The longer enterprises wait, the harder and more expensive the migration becomes.							]]></description>
		</item>
				<item>
			<dc:creator>Warwick Ashford</dc:creator>			<pubDate>Tue, 23 Sep 2025 10:00:00 +0200</pubDate>
			<title><![CDATA[Ghost Tapping: A New Front in Identity Security Risk]]></title>
			<link>https://www.kuppingercole.com/blog/ashford/ghost-tapping-a-new-front-in-identity-security-risk</link>
			<guid>https://www.kuppingercole.com/blog/ashford/ghost-tapping-a-new-front-in-identity-security-risk</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Warwick Ashford</a></p><p>Ghost tapping is rapidly emerging as a stealthy attack vector that poses a serious challenge to digital identity and payment security. Originally observed among Chinese-speaking threat actors by security researchers at <a href="https://www.threatfabric.com/blogs/ghost-tap-new-cash-out-tactic-with-nfc-relay">Threat Fabric</a> who coined the term, this technique exploits Near Field Communication (NFC) relay methods to commit retail fraud using stolen payment card credentials loaded into mobile wallets such as Apple Pay and Google Pay. While the mechanics are highly technical, the consequences are straightforward: unauthorized transactions, physical goods stolen, and illicit funds laundered across borders.</p>
<h2>How Ghost Tapping Works</h2>
<p>At its core, ghost tapping is NFC relay fraud. Cybercriminals obtain stolen payment card data, often via phishing or malware, link it to burner phones, and transmit the NFC signal to mules who conduct in-person purchases at retail stores or withdraw cash from ATMs. Software created and controlled by cybercriminals enables remote management of these cards, making the operation scalable and difficult to detect. The syndicate model amplifies the threat. Cybercriminals handle the digital side while syndicates recruit mules, coordinate logistics, and resell goods for cash or cryptocurrency. In practice, this means a victim&rsquo;s card is silently added to a mobile wallet like Apple Pay or Google Pay and then relayed in real time to a mule&rsquo;s phone, letting them &ldquo;tap&rdquo; at the point of sale as if they were the rightful cardholder. The stolen goods are quickly moved, resold, and turned into profit, completing the cycle.</p>
<h2>Implications for Businesses</h2>
<p>The rise of ghost tapping has far-reaching implications for digital identity governance and cyber risk management. For banks and payment providers, it exposes weaknesses in mobile wallet provisioning, one-time password (OTP) verification, and device authentication. For retailers, it highlights gaps in in-person verification and transaction monitoring. For insurers and regulators, it raises questions about liability for losses tied to NFC relay fraud. The cross-border nature of these campaigns, spanning Southeast Asia, China, and potentially beyond, means that no organization operating in mobile payment ecosystems can afford complacency.</p>
<h2>Why Organizations Should Be Concerned</h2>
<p>Ghost tapping demonstrates how identity compromise is no longer confined to digital environments. A stolen credential can be converted into physical goods, laundered through mules, and monetized across borders with minimal detection. Automated linking of compromised cards to mobile wallets further accelerates the fraud lifecycle, eroding trust in digital payment systems and threatening operational resilience. Businesses relying on mobile payments and contactless systems are now exposed not only to financial loss but also to reputational and regulatory risk.</p>
<h2>Mitigating the Risk</h2>
<p>Defending against ghost tapping requires a layered approach to identity security.</p>
<p>Banks and payment providers should enforce stronger authentication for adding cards to wallets, move beyond SMS-based OTPs, and use machine learning to flag anomalous wallet activity or geographically improbable transactions.</p>
<p>Retailers must implement robust transaction monitoring and identity verification procedures for in-person purchases.</p>
<p>Consumers should remain vigilant, never share OTPs, monitor card activity, and limit exposure to untrusted apps or websites.</p>
<p>Law enforcement and regulators need to track evolving NFC relay fraud trends, collaborate internationally, and disrupt syndicate operations.</p>
<h2>Looking Ahead</h2>
<p>Ghost tapping provides an important lesson. Identity compromise can now bridge the digital and physical worlds, converting stolen credentials into tangible assets. With cybercriminals adapting rapidly and globalized syndicates exploiting Telegram-based marketplaces, organizations must elevate identity governance from an IT function to a strategic risk priority. Strong authentication, continuous monitoring, and integrated identity controls are no longer optional. They are essential defenses against a threat that moves as quickly as the digital wallets it targets.</p>
<p>This is not just a payments problem; it&rsquo;s a wake-up call for identity security across every interaction in the digital economy.</p>
<p>For expert guidance on combating identity fraud and emerging threats like ghost tapping, KuppingerCole&rsquo;s <a href="https://www.kuppingercole.com/advisory">Advisory Team</a> is ready to help. Organizations can also explore KuppingerCole&rsquo;s Leadership Compass Reports on Fraud Reduction Intelligence Platforms for <a href="https://www.kuppingercole.com/research/lc80841/fraud-reduction-intelligence-platforms-finance">Finance</a> and <a href="https://www.kuppingercole.com/research/lc81139/fraud-reduction-intelligence-platforms-ecommerce">eCommerce</a>, offering practical insights into selecting the right solutions to mitigate these risks.</p>
<p>When it comes to securing digital wallets and strengthening identity governance, proactive defense is the best strategy.</p>							]]></description>
		</item>
				<item>
						<pubDate>Mon, 22 Sep 2025 09:35:16 +0200</pubDate>
			<title><![CDATA[Dec 04, 2025: Integrating Non-Human Identities Into Identity Governance Programs]]></title>
			<link>https://www.kuppingercole.com/events/non-human-identities</link>
			<guid>https://www.kuppingercole.com/events/non-human-identities</guid>
			<description><![CDATA[ Non-human identities now outnumber human users. Yet most IGA systems, built for a different era, leave them unmanaged, unowned, and dangerously exposed. Trying to force-fit NHIs into legacy IGA models only deepens the problem. Endless customization creates fragility, not flexibility.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 22 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[KPIs vs KRIs in IAM: Metrics That Drive Business Outcomes]]></title>
			<link>https://www.kuppingercole.com/watch/kpis-vs-kris-iam</link>
			<guid>https://www.kuppingercole.com/watch/kpis-vs-kris-iam</guid>
			<description><![CDATA[ <p><strong>Are KPIs and KRIs just compliance checkboxes, or can they truly prove the value of Identity and Access Management (IAM)? </strong>In this episode, Matthias Reinwarth and senior advisor Shikha Porwal explore how Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) can transform IAM from a technical function into a business enabler. They unpack the differences, the overlap, and how to make metrics relevant to both security and strategy. Expect real-world examples&mdash;from onboarding to MFA adoption&mdash;that show how measurement drives maturity and risk reduction.</p>
<p><strong>Key Topics Covered:</strong></p>
<ul>
<li>KPIs vs KRIs in IAM: what they are and how they differ</li>
<li>Aligning IAM metrics with business goals and governance</li>
<li>Onboarding &amp; offboarding metrics for efficiency and risk reduction</li>
<li>MFA adoption and help desk tickets as signals of IAM maturity</li>
<li>Developer enablement and API adoption as success factors</li>
<li>Mapping IAM indicators to risk frameworks and security posture</li>
<li>Adapting KPIs/KRIs for non-human identities (NHI)</li>
</ul>
<p>If you&rsquo;re working in IAM, identity governance, MFA strategy, or security architecture, this discussion will help you build meaningful metrics that prove value and strengthen your identity program.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/kpis-vs-kris-iam"><img src="https://www.kuppingercole.com//videothumb/kpis-vs-kris-iam/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Fri, 19 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[API Platforms: The New Security Perimeter for the Age of GenAI and Agentic Systems]]></title>
			<link>https://www.kuppingercole.com/watch/api-platforms</link>
			<guid>https://www.kuppingercole.com/watch/api-platforms</guid>
			<description><![CDATA[ <p>APIs are no longer just technical plumbing, they&rsquo;re the interface layer of digital transformation, AI orchestration, and enterprise risk. As organizations rush to integrate LLMs, agentic workflows, and composable services, the attack surface grows exponentially.</p>
<p>Language Models and Agentic AI systems now interact with IT environments almost exclusively via APIs. That makes every exposed endpoint a potential channel for misuse, exfiltration, or supply chain compromise. Securing the model is no longer enough - you must secure the interface.</p>
<p>This webinar explores how top vendors are approaching this challenge, based on research from KuppingerCole&rsquo;s latest Leadership Compass on API Security and Management. Learn how modern API security platforms are evolving to cover the AI attack surface with adaptive, protocol-aware, and context-driven controls.</p>
<p></p>
<p></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/api-platforms"><img src="https://www.kuppingercole.com//videothumb/api-platforms/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Mike Small</dc:creator>			<pubDate>Thu, 18 Sep 2025 17:33:27 +0200</pubDate>
			<title><![CDATA[Cohesity and Veritas 10 months on]]></title>
			<link>https://www.kuppingercole.com/blog/small/cohesity-and-veritas-10-months-on</link>
			<guid>https://www.kuppingercole.com/blog/small/cohesity-and-veritas-10-months-on</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Mike Small</a></p><h2 class="KCHead1">From Privacy Breaches to Denial of Business</h2>
<p>Last December <a href="https://www.kuppingercole.com/blog/small/the-marriage-of-cohesity-and-veritas">Cohesity and Veritas merged</a>, now 10 months on, the impact of this merger can be seen through the announcements at the Cohesity Catalyst.</p>
<p>These announcements could not be timelier. Recent cyber incidents at Marks &amp; Spencer (M&amp;S) and Jaguar Land Rover (JLR) in 2025 illustrate the direct impact of cybersecurity failures on business operations, revenue, and reputation. These illustrate how cyber incidents are moving from privacy related data breaches to business disruption.</p>
<p style="text-align: center;"><img src="/pics/cyber_hygiene_foundation_of_digital_resilience.png" alt="" /><sub>Figure 1: Cyber Hygiene is the Foundation of Digital Resilience</sub></p>
<p>Cyber hygiene is the foundation for digital resilience, however it is not enough to protect and prevent, to be resilient your organization must be able to respond to and recover from cyber incidents. Since today&rsquo;s digital business depends upon data, digital resilience is based on data resilience.</p>
<p>While delivering digital services ultimately requires physical infrastructure &ndash; resilience of the services involves more than just physical replication. Digital services depend upon the availability of the business data. In addition, applications and their Infrastructure as Code (IaC) services are defined by data. No data means no service, and service restoration needs more than recovering the database.</p>
<p>Cohesity&rsquo;s Catalyst 2025 event highlights how its new capabilities address this need&mdash;moving beyond backup to provide an integrated platform for comprehensive cyber resilience.</p>
<h2 class="KCHead1">Cohesity Catalyst announcements</h2>
<p class="KCBoldHeader"><strong>Planning and Preparation</strong></p>
<p>Digital resilience starts with planning and preparation. You need to know what data you have and identify the core systems that are essential to keep your business running.</p>
<p>Cohesity&rsquo;s partnership with CYERA provides DSPM capabilities to help organizations to understand what data is at risk and how well it is protected. Cohesity CERT &ndash; provides cyber resilience consulting services to help prepare, as well as to respond when an incident occurs.</p>
<p>Disaster planning involves more than data backup. It includes team building and setting up out of band communications.</p>
<p class="KCBoldHeader"><strong>Extended range of Protected Data Sources</strong></p>
<p>May organizations have a wide range of legacy data sources as well as the new ones used by GenAI. It is essential that an organization can protect all their data.</p>
<p>Cohesity, collaborating with their colleagues from Veritas, announced over 40 new and enhanced workload connectors. These cover data sources in AWS, Google Cloud, Azure, Oracle, Nutanix and VMware.</p>
<p>Recovering legacy systems is often very complex, involving more than data restoration.</p>
<p class="KCBoldHeader"><strong>Secure and Uncorrupted Data</strong></p>
<p>Cyber resilience depends upon Secure and uncorrupted data: Recovery depends on having trustworthy, immutable backups.</p>
<p>Cohesity&rsquo;s Fort Knox vaulting provides isolation through immutability and air-gapping. Immutable backup storage and object lock ensure data cannot be tampered with, even during a ransomware attack. Cohesity announced a self-managed option for organizations that need physical control over their data.</p>
<p>While Cohesity&rsquo;s Fort Knox is a strong solution it is not free and needs to be managed carefully in relation to compliance obligations such as the EU right to erasure.</p>
<p class="KCBoldHeader"><strong>Protecting the Protection</strong></p>
<p>The backup data and processes are a prime target for threat actors and so it is essential to protect these.</p>
<p>Cohesity announced their intention to extend the threat monitoring of their backup services. These are anticipated to include hash-based threat hunting to find Indicators of Compromise (IoC) within your backup data, as well as integration with Google Threat Intelligence.</p>
<p>This is a statement of intention and customers should monitor its implementation.</p>
<p class="KCBoldHeader"><strong>Protecting the Identity Store</strong></p>
<p>Your organization&rsquo;s identity store is fundamental to all your business services, often including access to buildings.</p>
<p>Cohesity&rsquo;s partnership with Semperis will help organizations to protect their Active Directory. It allows them to automate backup of the AD application to immutable storage, without needing to backup the whole host which may have been infected with malware. It also enables automated recovery.</p>
<p>Active Directory recovery often involves intricate dependencies with applications, networking, and hybrid cloud, it is important that customers rehearse to validate recovery scenarios.</p>
<p class="KCBoldHeader"><strong>Recovery and Restoration</strong></p>
<p>Your organization&rsquo;s cyber resilience depends upon being able to recover from a cyber incident and restore your business operation.</p>
<p>Cohesity announced the availability of the Cohesity Recovery Agent. This helps organizations to automate and orchestrate their recover processes using a combination of human and AI interactions. It supports testing and rehearsing the recovery and restoration processes and provides documentation in auditor ready form to assist with compliance.</p>
<p>Automated recovery orchestration promises speed, yet successful recovery still depends on disciplined testing and clear runbooks.</p>
<p class="KCBoldHeader"><strong>Virtual Backup Data Lake</strong></p>
<p>Backup data is a potential source of data for use by GenAI</p>
<p>Cohesity GAIA can expose backup data as virtual data for exploitation by GenAI or other applications. &nbsp;Cohesity says it provides multi language query support as well as capabilities to redact sensitive information.</p>
<p>Exposing this data provides new opportunities but will need careful controls.</p>
<h2 class="KCHead1">Opinion</h2>
<p>The recent incidents at Marks and Spenser and Jaguar Land Rover show that cyber resilience is a business imperative. Investments in cyber resilience should be viewed as core to operational resilience as part of complete business strategy.</p>
<p>The union of Cohesity and Veritas was a transformative moment for the data protection and cyber resilience market. As the largest player in the market, the combined company has the power to set new standards, influence industry trends, and drive the next wave of innovation. For customers, this means access to unparalleled technology and expertise.</p>
<p>The announcements from Cohesity show welcome progress towards this vision through integration of products and engineering teams.</p>
<p>However, the proof or the pudding is always in the eating. Cohesity will need to show customer examples that illustrate the power of their solutions to recover not only the digital systems but also business operation following an incident.</p>
<p>Cohesity is not the only vendor in this market, you can find a detailed evaluation of this and other vendors in our <a href="https://www.kuppingercole.com/research/lc80868/cloud-backup-for-ai-enabled-cyber-resilience" target="_blank">Leadership Compass Cloud Backup for AI Enabled Cyber Resilience</a>.&nbsp;</p>
<p>To explore best practices in data protection and compliance, join us at <a href="https://www.kuppingercole.com/events/iccid2025" target="_blank">Identity-Centric Cybersecurity Impact Day 2025</a> in Frankfurt, on November 6, 2025.&nbsp;</p>							]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Thu, 18 Sep 2025 15:36:00 +0200</pubDate>
			<title><![CDATA[Evaluating IVIP: Enhancing Identity Management Through Unified Visibility and Intelligence]]></title>
			<link>https://www.kuppingercole.com/blog/kuppinger/evaluating-ivip-enhancing-identity-management-through-unified-visibility-and-intelligence</link>
			<guid>https://www.kuppingercole.com/blog/kuppinger/evaluating-ivip-enhancing-identity-management-through-unified-visibility-and-intelligence</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p><p>Organizations increasingly look to Identity and Access Management (IAM) to strengthen security, streamline compliance, and ensure reliable operations. Identity Visibility and Intelligence Platforms (IVIP) have surfaced as a much-discussed enhancement in this domain, promising an integrated view across various IAM systems. But what does IVIP genuinely offer beyond the capabilities of existing IAM solutions? And how should organizations embark on integrating such a platform?</p>
<p>IVIP leverages data from key IAM facets&mdash;Identity Governance and Administration (IGA), Privileged Access Management (PAM), and Identity Threat Detection and Response (ITDR) &mdash; creating a centralized dashboard of identity activities both for human and non-human identities. This aggregation aims to transition identity management from basic visibility to comprehensive observability, opening avenues for actionable insights and informed decision-making. However, the notion of IVIP as a standalone platform warrants scrutiny. It is perhaps better seen as an augmentation rather than a disruptor, building on pre-existing strengths within IAM infrastructures.</p>
<p>Central to the IVIP proposition is its potential to enhance risk management by providing prioritized insights and enabling dynamic compliance monitoring. Yet its integration is not without challenges. Differing system entitlements and complex data landscapes necessitate a mature and well-planned approach, focused on harmonizing software and systematic data integration through APIs.</p>
<p>Critically, as vendors reposition existing offerings under the IVIP banner, there is a risk of redundancy. Organizations must wisely evaluate how IVIP fits into their IAM strategy, ensuring it enriches rather than duplicates existing capabilities. Particularly for those at earlier stages in their IAM journey, IVIP offers a strategic entry point to refine and level-up their identity management strategies.</p>
<p>In summary, while IVIP carries the potential to integrate and enhance IAM operations, its true value lies in its deployment strategy and alignment with the existing Identity Fabric. With detailed planning and cautious implementation, IVIP can indeed serve as a catalyst for improved IAM practices, offering measured insights and enhanced operational resilience.</p>
<p>For those interested in a deeper dive, including strategic recommendations for IVIP integration within your organization, we invite you to read our comprehensive <a href="https://www.kuppingercole.com/research/an82006/ivip-identity-visibility-and-intelligence-platform-or-capabilities" target="_blank">Advisory Note</a> on this topic.</p>							]]></description>
		</item>
				<item>
						<pubDate>Thu, 18 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Navigating the Future of Access Management]]></title>
			<link>https://www.kuppingercole.com/watch/access-management-future</link>
			<guid>https://www.kuppingercole.com/watch/access-management-future</guid>
			<description><![CDATA[ <p>Access Management has transformed from a siloed set of controls into a critical enabler of digital business. This webinar explores how organizations can modernize their access strategies to support hybrid IT, secure machine identities, and meet growing compliance and user experience demands. We will examine trends such as IDaaS adoption, AI integration, and zero-trust architectures, while offering guidance on choosing the right solution for your enterprise.</p>
<p>Key Takeaways:</p>
<ul>
<li>Understand the evolution from WAM to cloud-native IDaaS</li>
<li>Learn how to bridge on-prem and cloud identity ecosystems</li>
<li>Explore best practices for managing machine identities</li>
<li>Discover how to deliver consistent user experiences across platforms and environments</li>
<li>Gain insights into the future of AI-powered access management</li>
</ul>
<p>In this live session, Alejandro Leal will unpack key insights from KuppingerCole's latest Leadership Compass on Access Management &mdash; giving you a clear view of the top vendors, emerging architectures, and what&rsquo;s next for the industry. Discover how leading organizations are modernizing authentication, securing AI agents and non-human identities, and seamlessly connecting legacy and cloud systems. From ITDR to passwordless adoption and hybrid deployment models, you&rsquo;ll gain practical strategies to strengthen security, ensure compliance, and keep your organization ahead of the curve.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/access-management-future"><img src="https://www.kuppingercole.com//videothumb/access-management-future/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Jonathan Care</dc:creator>			<pubDate>Wed, 17 Sep 2025 13:01:50 +0200</pubDate>
			<title><![CDATA[CoreView]]></title>
			<link>https://www.kuppingercole.com/research/ev81444/coreview</link>
			<guid>https://www.kuppingercole.com/research/ev81444/coreview</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Jonathan Care</a></p>CoreView is a Microsoft 365 specialist cyber resilience platform that delivers Zero-Trust enforcement, granular least-privilege administration, and deep automation to secure and streamline complex enterprise environments. Its proprietary Virtual Tenant architecture, AI-powered workflows, and compliance-ready features address both security and operational needs, particularly in regulated markets. With sustained growth and strong profitability, CoreView offers specialized capabilities that complement enterprise IAM strategies.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 17 Sep 2025 09:59:52 +0200</pubDate>
			<title><![CDATA[Oct 23, 2025: The New Face of Fraud: How AI Agents Are Rewriting Digital Trust and Risk]]></title>
			<link>https://www.kuppingercole.com/events/tackling-modern-fraud</link>
			<guid>https://www.kuppingercole.com/events/tackling-modern-fraud</guid>
			<description><![CDATA[ Fraud is entering a phase where familiar defenses lose their value. With generative AI and consumer agents now mediating digital interactions, once-reliable signals like device fingerprints, behavioral biometrics, and even “clean” sessions can no longer be trusted. Legacy fraud reduction tools weren’t built for this new reality, and organizations now face a critical challenge: how to outpace increasingly sophisticated fraud without adding friction to trusted customers.							]]></description>
		</item>
				<item>
						<pubDate>Wed, 17 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Securing the Digital Fabric: How IAM and DSPM Shape Data Protection Strategies]]></title>
			<link>https://www.kuppingercole.com/watch/securing-the-digital-fabric</link>
			<guid>https://www.kuppingercole.com/watch/securing-the-digital-fabric</guid>
			<description><![CDATA[ <p>In today&rsquo;s cloud-centric world, data no longer lives behind traditional perimeters. Instead, it moves fluidly across SaaS platforms, IaaS environments, and hybrid infrastructures &mdash; making identity the new control plane. As organizations confront modern threats, the intersection of identity and data protection is where cyber resilience must begin.</p>
<p>Modern enterprises can no longer treat Identity and Access Management (IAM) and Data Security Posture Management (DSPM) as separate disciplines. Integrating identity context into DSPM and DLP strategies enhances visibility, limits blast radius, and makes prevention and response more intelligent and dynamic. This webinar will explore how this integrated approach reshapes proactive defense.</p>
<p>John Tolbert, Director of Research and a Lead Analyst at KuppingerCole, will outline the latest research on identity-first security. They will explore how IAM and DSPM together address emerging threats, highlight real-world identity attack vectors, and explain why identity posture must be part of any data-centric security architecture.</p>
<p>Matt Lock, Field CTO at Varonis, will provide a deep dive into how Varonis&rsquo; Data Security Platform applies AI-driven automation to discover critical data, enforce least-privilege access, and stop insider and external threats. He&rsquo;ll showcase practical examples of integrating identity fabric with DSPM and illustrate how to quantify risk and reduce blast radius across cloud environments.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/securing-the-digital-fabric"><img src="https://www.kuppingercole.com//videothumb/securing-the-digital-fabric/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Osman Celik</dc:creator>			<pubDate>Tue, 16 Sep 2025 12:30:00 +0200</pubDate>
			<title><![CDATA[How Cybercriminals Build Deepfake Campaigns]]></title>
			<link>https://www.kuppingercole.com/blog/celik/inside-the-toolkit-how-cybercriminals-build-deepfake-campaigns</link>
			<guid>https://www.kuppingercole.com/blog/celik/inside-the-toolkit-how-cybercriminals-build-deepfake-campaigns</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Osman Celik</a></p><p>A couple of months ago, I wrote the first article in this deepfake blog series and received positive feedback from readers in various industries. The initial post focused on the current state of deepfake threats and the extent to which detection tools can keep up. Today, I would like to shift our attention to how cybercriminals build deepfake campaigns. While statistics show that older people often lose more money and younger people are more susceptible to certain scams, recent incidents reveal attackers tricking older victims into believing they are speaking with relatives. At the same time, executives are being impersonated to pressure employees into making urgent transfers. Understanding how these attacks are crafted provides insight into why they are so effective and are spreading so quickly.</p>
<p>Their beginning point is always data. Publicly available material such as social media videos, podcasts, interviews, casual voice notes, serves as the basis for generating synthetic media. Attackers no longer need extensive or high-quality recordings. Modern voice-cloning tools can reproduce someone&rsquo;s tone and style with just a few seconds of audio. For visuals, a few photographs or short video clips are enough to train face-swap or lip-sync models that produce convincing enough outputs to fool many observers.</p>
<p>After gathering that material, the fraudsters compose scenarios that exploit the target&rsquo;s trust. A voice impersonation alone is weak unless embedded in a storyline, perhaps a family emergency or a sudden financial crisis, where urgency is emphasized. The synthetic media then acts as the evidence of that story. Victims are not only hearing or seeing something familiar but are also pressured by time or fear, which reduces the chance they will question what they perceive. <a href="https://www.europol.europa.eu/cms/sites/default/files/documents/Steal-deal-repeat-IOCTA_2025.pdf" target="_blank">Europol&rsquo;s</a> 2025 Internet Organised Crime Threat Assessment (IOCTA) reports that criminals are increasingly using generative tools to impersonate persons of trust in multi-lingual messages or voice-cloned calls, and these schemes are causing growing financial and reputational damage across both people and organizations.</p>
<p>Technical setup is refined to hide obvious signs. Attackers lower resolution, compress video, insert ambient noise, or slightly distort visuals so that detectors or human perception are misled. <a href="https://www.researchgate.net/publication/389581656_Deepfake-Eval-2024_A_Multi-Modal_In-the-Wild_Benchmark_of_Deepfakes_Circulated_in_2024" target="_blank">Recent research</a> shows that detection tools that perform very well in controlled environments lose substantial accuracy when faced with content compressed by social platforms or in less ideal lighting. The Deepfake-Eval-2024 benchmark, for example, collected in-the-wild media (44 hours of video, 56.5 hours of audio, nearly 2,000 images from dozens of languages and websites) and found that open-source state-of-the-art detectors drop in performance by around 50% for video detection, 48% for audio, and 45% for image detection compared to their scores on older academic datasets.</p>
<p>Meanwhile, attackers also scale up. Deepfake-as-a-service platforms allow clients with little technical skill to order impersonations services. GPU time is rented, pre-trained models are shared, and simple applications enable custom synthetic voice or facial content. Thus, what once required expert work now becomes available to less-sophisticated cybercriminals. The result is that attacks are increasingly widespread, not only targeting high-profile individuals but regular people, small firms, and non-profit organizations.</p>
<p>To make the scam feel real, victims receive messages, calls, or fake visuals that seem familiar, mixed with emotional or urgent pressure that pushes them to act quickly. Even when doubts emerge, the presence of synthetic &ldquo;proof&rdquo; makes hesitation difficult. This entire process is not accidental but assembled by design: collecting authentic materials, crafting synthetic replicas, embedding them in persuasive narratives, and delivering them via channels the victim believes are reliable.</p>
<p>These campaigns have been successful lately because they exploit both the blind spots in detection technologies and the mental shortcuts people often rely on under pressure. Comprehending this complex design is necessary for creating defenses that are meaningful, whether through more stringent verification methods, better employee awareness training, or improvements in detection technologies. In the next blog, I will discuss these practical measures such as better verification, awareness training, and advanced detection tools that organizations and individuals can use to counter these threats.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Tue, 16 Sep 2025 09:33:35 +0200</pubDate>
			<title><![CDATA[Maturity Level Matrices for NHI Management]]></title>
			<link>https://www.kuppingercole.com/research/an82007/maturity-level-matrices-for-nhi-management</link>
			<guid>https://www.kuppingercole.com/research/an82007/maturity-level-matrices-for-nhi-management</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>Managing Non-Human Identities (NHIs) is not just a necessity but critical for securing our digital infrastructures. NHIs, ranging from device identities and service accounts to workload identities and AI agents, form the backbone of modern enterprise operations. This document looks at a structured approach for the management of NHIs, applying the Capability Maturity Model (CMM) to outline a progression from nascent to advanced governance levels. This approach allows organizations to evolve their security frameworks effectively, ensuring aligned growth between technological advances and strategic business goals.							]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Tue, 16 Sep 2025 08:51:02 +0200</pubDate>
			<title><![CDATA[IVIP: Identity Visibility and Intelligence - Platform or Capabilities?]]></title>
			<link>https://www.kuppingercole.com/research/an82006/ivip-identity-visibility-and-intelligence-platform-or-capabilities</link>
			<guid>https://www.kuppingercole.com/research/an82006/ivip-identity-visibility-and-intelligence-platform-or-capabilities</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>In organizations today, managing identity and access effectively is mandatory for safeguarding digital operations against evolving threats and compliance demands. Identity Visibility and Intelligence Platforms (IVIP) have emerged, integrating disparate IAM components like IGA, PAM, AM, and ITDR, aiming to provide enhanced visibility and analytical insight. Positioned within the Identity Fabric's audit and analytics sphere, IVIP has prompted debate regarding its role, whether merely an augmentation of existing capabilities or a standalone platform. This exploration provides a thorough examination of IVIP's real value, discussing its practical application within current IAM structures.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 15 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Do We Really Need IVIP? Identity Fabric vs. Buzzwords]]></title>
			<link>https://www.kuppingercole.com/watch/do-we-need-ivip</link>
			<guid>https://www.kuppingercole.com/watch/do-we-need-ivip</guid>
			<description><![CDATA[ <p>Are IVIPs truly a new platform that organizations must adopt, or are they just <strong>old capabilities rebranded with fresh marketing spin</strong>? Today, Matthias Reinwarth and Martin Kuppinger dig into the latest acronym shaking up the IAM world: <strong>IVIP (Identity Visibility &amp; Intelligence Platforms)</strong>. We unpack the promises, the risks, and what IVIP really means for the <strong>Identity Fabric</strong> concept. Expect a critical take on buzzwords, vendor strategies, and what enterprises <em>actually</em> need to strengthen IAM maturity.</p>
<p><strong>Key Topics Covered:</strong></p>
<ul>
<li>What IVIP actually is and how it fits into IAM</li>
<li>The connection between IVIP and the Identity Fabric approach</li>
<li>Risks of marketing buzzwords in identity management</li>
<li>When a new platform really brings value&mdash;and when it doesn&rsquo;t</li>
<li>What organizations should focus on instead of chasing hype</li>
</ul>
<p>If you&rsquo;re working in <strong>identity, access governance, ITDR, IGA, or security architecture</strong>, this conversation will help you decide whether IVIP deserves a place in your roadmap&mdash;or if it&rsquo;s just hype.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/do-we-need-ivip"><img src="https://www.kuppingercole.com//videothumb/do-we-need-ivip/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Fri, 12 Sep 2025 10:35:38 +0200</pubDate>
			<title><![CDATA[Email Security]]></title>
			<link>https://www.kuppingercole.com/research/lc80888/email-security</link>
			<guid>https://www.kuppingercole.com/research/lc80888/email-security</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>Discover how evolving email threats like phishing and BEC necessitate advanced, AI-driven solutions to protect enterprise communications. Explore trends in email security, including multi-channel support and generative AI use, unveiling insights on adopting adaptive technologies to navigate today's complex cyber landscape seamlessly.							]]></description>
		</item>
				<item>
						<pubDate>Fri, 12 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Identity-Governance-Strategien für die Post-IDM Ära]]></title>
			<link>https://www.kuppingercole.com/watch/identity-governance-strategien</link>
			<guid>https://www.kuppingercole.com/watch/identity-governance-strategien</guid>
			<description><![CDATA[ <p>Die Abk&uuml;ndigung von SAP IDM konfrontiert Unternehmen mit der dringlichen Aufgabe, SAP-Systeme effektiv in bestehende Identity-Governance- und Administration-(IGA)-L&ouml;sungen zu integrieren. Diese Umstellung birgt nicht nur technische Herausforderungen, sondern erfordert auch Anpassungen in Compliance und Sicherheitsstrategien, um weiterhin den bestm&ouml;glichen Schutz f&uuml;r digitale Identit&auml;ten zu gew&auml;hrleisten.</p>
<p>Moderne Technologieplattformen bieten bew&auml;hrte Ans&auml;tze f&uuml;r die Integration komplexer SAP-Landschaften in IGA-Systeme. Von automatisierten Berechtigungsmodellen &uuml;ber nahtloses Benutzer- und Rollenmanagement bis zu umfassendem Monitoring &ndash; neue Tools adressieren vielf&auml;ltige Anforderungen und erm&ouml;glichen einen reibungslosen Migrationsprozess.</p>
<p><strong>Matthias Reinwarth, </strong>IAM Practice Director, wird auf die strategischen Auswirkungen der SAP-IDM-Abk&uuml;ndigung eingehen. Er zeigt auf, welche technischen und organisatorischen Weichen nun gestellt werden m&uuml;ssen, und welche Optionen Unternehmen haben, um ihre Identit&auml;tsarchitektur zukunftssicher und compliance-gerecht zu transformieren.</p>
<p><strong>Klaus Hild</strong>, Manager Solution Engineering bei SailPoint, wird praxisnahe Beispiele liefern, wie moderne IGA-L&ouml;sungen SAP-Umgebungen optimal unterst&uuml;tzen. Er beleuchtet konkrete Projekte, technische Integrationswege und die Effizienzsteigerung durch Automatisierung.</p>
<p><strong>Tim Lipphardt</strong>, Head of Consulting bei amiconsult, berichtet aus Projekten zur Abl&ouml;sung von SAP IDM, benennt Erfolgsfaktoren f&uuml;r die SAP-IGA-Integration und zeigt auf, wie sich technische Anforderungen mit strategischen IAM-Zielen in Einklang bringen lassen.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/identity-governance-strategien"><img src="https://www.kuppingercole.com//videothumb/identity-governance-strategien/400"></a>			]]></description>
		</item>
				<item>
						<pubDate>Wed, 10 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Julian Schwarzkopf on Data Access & Modern IAM | Identity Fabric Impact Day Speaker Spotlight]]></title>
			<link>https://www.kuppingercole.com/watch/2025-ifid-speaker-spotlight-julian-schwarzkopf</link>
			<guid>https://www.kuppingercole.com/watch/2025-ifid-speaker-spotlight-julian-schwarzkopf</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">Identity Fabric is evolving &mdash; and data access is at the center of this transformation. Today, Julian Schwarzkopf shares why organizations must shift from a system- and user-focused approach to a data-first identity model.</p>
<p>You&rsquo;ll learn:</p>
<ul>
<li>Why the next generation of Identity Fabric focuses on who can access what data</li>
<li>The biggest challenges in managing data access across systems and databases</li>
<li>How dynamic, data-aware policies enable fine-grained, context-driven access control</li>
<li>The evolving role of roles in a data-driven identity model</li>
<li>How rethinking identity &amp; access management (IAM) can turn it from a bottleneck into a business enabler</li>
</ul>
<p>Don&rsquo;t miss Julian&rsquo;s keynote at Identity Fabric Impact Day 2025, where he&rsquo;ll show how to take IAM to the next level with a data-centric perspective.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/2025-ifid-speaker-spotlight-julian-schwarzkopf"><img src="https://www.kuppingercole.com//videothumb/2025-ifid-speaker-spotlight-julian-schwarzkopf/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Alexei Balaganski</dc:creator>			<pubDate>Mon, 08 Sep 2025 12:21:17 +0200</pubDate>
			<title><![CDATA[From Perimeter to Persona: Why Data Security Now Starts with Identity]]></title>
			<link>https://www.kuppingercole.com/research/wp81446/from-perimeter-to-persona-why-data-security-now-starts-with-identity</link>
			<guid>https://www.kuppingercole.com/research/wp81446/from-perimeter-to-persona-why-data-security-now-starts-with-identity</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alexei Balaganski</a></p>Enterprise data security now begins with identity rather than the network perimeter. Sensitive information spans clouds, SaaS, and AI environments, making compromised credentials the primary attack vector. Integrating discovery, classification, and Data Security Posture Management with identity-aware enforcement, automation, and AI enables least-privilege access, rapid incident response, and compliance. Varonis provides a unified platform to implement this identity-first approach effectively.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 08 Sep 2025 11:01:18 +0200</pubDate>
			<title><![CDATA[Nov 04, 2025: Fireside Chat: How OpenAI and Axel Springer Made Identity a Growth Engine]]></title>
			<link>https://www.kuppingercole.com/events/identity-growth-engine</link>
			<guid>https://www.kuppingercole.com/events/identity-growth-engine</guid>
			<description><![CDATA[ Customer Identity and Access Management (CIAM) has outgrown its role as a basic security layer. Yet many enterprises are still weighed down by legacy IAM systems that can’t scale, lock them into rigid architectures, and slow down product innovation—ultimately costing users, revenue, and competitive edge.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 08 Sep 2025 10:19:32 +0200</pubDate>
			<title><![CDATA[Oct 30, 2025: From Discovery to Remediation: The 2025 Landscape for Attack Surface Management]]></title>
			<link>https://www.kuppingercole.com/events/attack-surface-management</link>
			<guid>https://www.kuppingercole.com/events/attack-surface-management</guid>
			<description><![CDATA[ Attack Surface Management (ASM) is a continuous process that involves identifying, assessing, and proactively securing an organization's assets to close security gaps before attackers can exploit them. 
ASM includes four core areas: 1) External Attack Surface Management (EASM), which identifies internet-facing assets such as domains, IP addresses, and applications; 2) Cyber Asset Attack Surface Management (CAASM), which focuses on internal and external assets, as well as cloud resources and misconfigurations; 3) Third-Party Risk Management (TPRM), which examines supply chain risks inherited from vendors, partners, and subsidiaries; and 4) Digital Risk Protection (DRP), which tracks external threats, such as phishing domains, social media impersonation, leaked credentials, and brand abuse. Together, these capabilities provide security teams with an attacker's view of their environment and help them understand their vulnerabilities and prioritize issues proactively.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 08 Sep 2025 10:03:12 +0200</pubDate>
			<title><![CDATA[Oct 14, 2025: Identity Without Intelligence Fails to Deliver Governance]]></title>
			<link>https://www.kuppingercole.com/events/replacing-fragmented-iam</link>
			<guid>https://www.kuppingercole.com/events/replacing-fragmented-iam</guid>
			<description><![CDATA[ Most enterprises still rely on siloed IAM tools stitched together with manual workarounds. The result: blind spots in authorizations, fragmented governance and compliance efforts that look good on paper but fail under scrutiny. Without true visibility across identities and entitlements, organizations are exposed to risks they cannot even quantify.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 08 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Interoperability by Design: Making IAM Work Across Legacy, SaaS, and Multi-Cloud]]></title>
			<link>https://www.kuppingercole.com/watch/iam-interoperability-by-design</link>
			<guid>https://www.kuppingercole.com/watch/iam-interoperability-by-design</guid>
			<description><![CDATA[ <p>Identity and Access Management (IAM) is no longer a one-off project&mdash;it&rsquo;s an ongoing journey. In this episode of the <strong>KuppingerCole Analyst Chat</strong>, Matthias Reinwarth is joined by <strong>Christopher (CISO &amp; Lead Advisor)</strong> and <strong>Deniz Algin (Advisor)</strong> to explore how organizations can successfully apply the <strong>Identity Fabric</strong> concept.</p>
<p>How to evolve from legacy systems to a future-proof IAM strategy without breaking existing operations? Why interoperability matters? What are the most common <strong>pitfalls organizations face</strong> when trying to modernize IAM? Find the answer to these questions and more in this episode!</p>
<p><strong>Key Topics Covered:</strong></p>
<ul>
<li>Identity Fabric explained through a powerful &ldquo;airport&rdquo; analogy ✈️</li>
<li>How to design IAM programs in brownfield environments (no rip &amp; replace)</li>
<li>Capability-driven approach vs. tool-driven decisions</li>
<li>Risk-based prioritization: quick wins, big wins &amp; roadmaps</li>
<li>Common pitfalls to avoid when modernizing IAM</li>
</ul>
<p>Whether you&rsquo;re just starting your IAM journey or looking to operationalize interoperability at scale, this episode is packed with <strong>practical strategies and lessons learned</strong>.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/iam-interoperability-by-design"><img src="https://www.kuppingercole.com//videothumb/iam-interoperability-by-design/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Jonathan Care</dc:creator>			<pubDate>Fri, 05 Sep 2025 07:40:26 +0200</pubDate>
			<title><![CDATA[How to Steal a Country – and How We Can Save the World]]></title>
			<link>https://www.kuppingercole.com/blog/care/how-to-steal-a-country-and-how-we-can-save-the-world</link>
			<guid>https://www.kuppingercole.com/blog/care/how-to-steal-a-country-and-how-we-can-save-the-world</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Jonathan Care</a></p><p class="p1"><i>In the shadows of server rooms and behind lines of code, a silent war is being waged for the heart of democracy itself.</i>&nbsp;</p>
<p class="p1">Picture this: It's election night. Millions of votes pour in through sleek electronic machines across the country. Results flash across screens in real-time, and by midnight, the winner is declared. But what if those results were wrong? What if, somewhere in the digital darkness, malicious actors had already decided the outcome before the first ballot was cast?&nbsp;</p>
<p class="p1">This isn't the plot of a political thriller&mdash;it's the reality election security experts lose sleep over every night. As democracies worldwide rush to embrace digital voting technologies, they're opening doors that some would prefer to keep locked forever.&nbsp;</p>
<h2 class="p2">The New Battlefield&nbsp;</h2>
<p class="p1">Gone are the days when stealing an election required stuffing physical ballot boxes or intimidating voters at polling stations. Today's threats come from sophisticated actors&mdash;state-sponsored groups, organized cybercriminals, and rogue insiders&mdash;who can potentially flip thousands of votes with a few keystrokes rather than paying off a handful of officials.&nbsp;</p>
<p class="p1">Electronic voting systems promise a utopian vision: faster results, fewer human errors, and greater accessibility for voters with disabilities. But they also create something that has never existed before in human history&mdash;the ability to alter an election outcome at massive scale while leaving virtually no trace.&nbsp;</p>
<p class="p1">The stakes couldn't be higher. When citizens lose faith in the integrity of their elections, democracy itself begins to crumble. We've already seen how allegations of election manipulation can tear societies apart, regardless of whether those allegations are true.&nbsp;</p>
<h2 class="p2">Digital Weapons of Mass Deception&nbsp;</h2>
<p class="p2"><strong>The Invisible Hand&nbsp;</strong></p>
<p class="p1">The most terrifying attacks are the ones you never see coming. Imagine malware so sophisticated it only activates on election day, so subtle it changes just enough votes to flip outcomes without triggering suspicion. Unlike traditional election fraud&mdash;which requires conspiracies of people who might eventually confess&mdash;digital manipulation can be executed by a single skilled attacker working alone.&nbsp;</p>
<p class="p1">Security researchers have demonstrated attacks that sound like science fiction but work in reality:&nbsp;</p>
<ul class="ul1">
<li class="li1"><span class="s1"></span><strong>Stealth viruses</strong> that hibernate in voting machines for months before awakening to alter results&nbsp;</li>
<li class="li1"><span class="s1"></span><strong>Logic bombs</strong> that trigger during vote counting, flipping victories to defeats&nbsp;</li>
<li class="li1"><span class="s1"></span><strong>Ghost voters</strong> created through manipulation of electronic poll books&nbsp;</li>
</ul>
<p class="p2"><strong>The Puppet Master's Toolkit&nbsp;</strong></p>
<p class="p1">Modern attackers have an arsenal that would make Cold War spies envious:&nbsp;</p>
<p class="p1"><strong>Remote Infiltration</strong>: Why break into a building when you can hack into the network? Voting systems connected to the internet&mdash;even briefly&mdash;become potential gateways for attackers operating from anywhere in the world.&nbsp;</p>
<p class="p1"><strong>Supply Chain Sabotage</strong>: The most elegant attacks happen before election day. Malicious code inserted during manufacturing could lie dormant for years before striking at the perfect moment.&nbsp;</p>
<p class="p1"><strong>Social Engineering</strong>: Sometimes the weakest link isn't the technology&mdash;it's the humans who operate it. A well-crafted phishing email targeting election officials could open doors that no amount of encryption can close.&nbsp;</p>
<p class="p2"><strong>The Identity Game&nbsp;</strong></p>
<p class="p1">In the digital realm, proving you are who you say you are becomes a high-stakes game of cat and mouse:&nbsp;</p>
<p class="p1"><strong>The Authentication Paradox</strong>: Electronic systems must verify voter identity without creating a digital trail that connects citizens to their votes. Get this wrong, and you either enable fraud or destroy ballot secrecy&mdash;both fatal to democracy.&nbsp;</p>
<p class="p1"><strong>Data Goldmines</strong>: Voter registration databases contain treasure troves of personal information. In the wrong hands, this data becomes ammunition for targeted disinformation campaigns or large-scale identity theft.&nbsp;</p>
<p class="p1"><strong>The Remote Voting Trap</strong>: Online voting sounds convenient until you realize there's no way to ensure the person casting the ballot is actually the registered voter&mdash;or that they're not being coerced by someone looking over their shoulder.&nbsp;</p>
<h2 class="p2">When Systems Fail&nbsp;</h2>
<p class="p1">Real-world incidents read like cautionary tales from a digital dystopia. Security researchers have found vulnerabilities in widely-used voting systems that would make cybersecurity professionals weep. In controlled demonstrations, experts have:&nbsp;</p>
<ul class="ul1">
<li class="li1"><span class="s1"></span>Installed vote-changing malware in under two minutes&nbsp;</li>
<li class="li1"><span class="s1"></span>Accessed sensitive voter data through unsecured wireless connections&nbsp;</li>
<li class="li1"><span class="s1"></span>Demonstrated how a single infected machine could spread malware to an entire network&nbsp;</li>
</ul>
<p class="p1">Meanwhile, technical failures during actual elections have caused chaos even without malicious intent: systems crashing on election morning, vote counts mysteriously disappearing, and results that don't add up forcing emergency paper ballot procedures.&nbsp;</p>
<p class="p1">Each incident erodes public trust a little more, creating exactly the chaos that hostile actors seek to achieve.&nbsp;</p>
<h2 class="p2">Fighting Back: The Digital Defenders&nbsp;</h2>
<p class="p1">But this isn't a story without heroes. Across the world, election security experts are building digital fortresses designed to protect democracy itself.&nbsp;</p>
<p class="p2"><strong>Building Unbreachable Walls&nbsp;</strong></p>
<p class="p1"><strong>Defense in Depth</strong>: Modern election security operates like a medieval castle&mdash;multiple walls, each designed to stop different types of attacks. If attackers breach the outer defenses, they face layer after layer of additional protections.&nbsp;</p>
<p class="p1"><strong>The Air Gap Strategy</strong>: The most secure systems are completely disconnected from any network. No internet, no wireless, no remote access&mdash;just isolated machines that can only be compromised through physical access.&nbsp;</p>
<p class="p1"><strong>Cryptographic Shields</strong>: Advanced mathematics becomes the guardian of democracy through encryption that would take centuries to break and digital signatures that make tampering immediately obvious.&nbsp;</p>
<p class="p2"><strong>The Paper Trail Revolution&nbsp;</strong></p>
<p class="p1">Perhaps the most elegant solution to digital voting vulnerabilities is refreshingly analog: paper. Voter-verified paper audit trails (VVPAT) create a physical backup of every electronic vote. These paper records enable meaningful audits and recounts when questions arise.&nbsp;</p>
<p class="p1"><strong>Risk-Limiting Audits</strong>: Statistical sampling techniques borrowed from quality control manufacturing allow election officials to verify results by manually checking just a small percentage of paper ballots&mdash;but enough to detect outcome-changing errors with mathematical certainty.&nbsp;</p>
<p class="p2"><strong>Identity Without Surveillance&nbsp;</strong></p>
<p class="p1">Cutting-edge cryptographic techniques are solving the authentication paradox:&nbsp;</p>
<p class="p1"><strong>Zero-Knowledge Proofs</strong>: Voters can prove their eligibility without revealing any personal information, like showing you have a valid ID without actually showing the ID itself.&nbsp;</p>
<p class="p1"><strong>Multi-Factor Verification</strong>: Combining something you know (personal information), something you have (ID documents), and something you are (biometric data) creates robust authentication while maintaining privacy.&nbsp;</p>
<h2 class="p2">The Human Element&nbsp;</h2>
<p class="p1">Technology alone cannot save democracy&mdash;people must be part of the solution:&nbsp;</p>
<p class="p1"><strong>The Insider Threat</strong>: Election systems are only as secure as the people who operate them. Multi-person integrity controls ensure that no single individual can compromise election results, while comprehensive background checks and ongoing monitoring help identify potential threats.&nbsp;</p>
<p class="p1"><strong>Training the Guardians</strong>: Election workers receive cybersecurity training that would impress corporate IT departments, learning to spot phishing attempts, secure sensitive data, and respond to potential attacks.&nbsp;</p>
<p class="p1"><strong>Transparency as a Weapon</strong>: Public testing events allow security researchers to probe voting systems for vulnerabilities, turning the entire cybersecurity community into volunteer guardians of democracy.&nbsp;</p>
<h2 class="p2">The Path Forward: Reclaiming Democracy<strong>&nbsp;</strong></h2>
<p class="p1">The future of election security lies not in choosing between digital efficiency and democratic integrity, but in proving they can coexist. This requires:&nbsp;</p>
<p class="p1"><strong>Continuous Vigilance</strong>: Election security is not a problem to be solved once but an ongoing arms race requiring constant adaptation and improvement.&nbsp;</p>
<p class="p1"><strong>Public-Private Partnerships</strong>: Government agencies, private companies, academic researchers, and citizen advocates must work together to stay ahead of evolving threats.&nbsp;</p>
<p class="p1"><strong>International Cooperation</strong>: Cyber attacks on elections are often transnational, requiring coordinated responses that transcend borders.&nbsp;</p>
<p class="p1"><strong>Citizen Engagement</strong>: Democracy belongs to the people, and the people must demand transparency, accountability, and security from their election systems.&nbsp;</p>
<h2 class="p2">The Stakes of Victory&nbsp;</h2>
<p class="p1">Every election is now a test of our digital defenses. The goal isn't to eliminate all risk&mdash;an impossible task in any human endeavor&mdash;but to make our systems so robust, transparent, and verifiable that public confidence remains unshakeable.&nbsp;</p>
<p class="p1">The alternative is too terrible to contemplate: a world where citizens no longer trust their own elections, where democracy withers not from external invasion but from internal doubt about the integrity of the most fundamental democratic act.&nbsp;</p>
<p class="p1">This is our challenge and our opportunity. The technology exists to secure our elections. The knowledge exists to implement it correctly. What remains is the will to treat election security with the urgency and resources it deserves.&nbsp;</p>
<p class="p1">Democracy has survived kings and dictators, wars and revolutions. Now it must survive the digital age. The outcome of this hidden battle will determine whether future generations inherit a democracy strengthened by technology or one corrupted by it.&nbsp;</p>
<p class="p1">The choice, quite literally, is ours to make. But we must make it now, before the next election becomes a demonstration of our failures rather than a celebration of our freedoms.&nbsp;</p>
<p class="p1"><i>The war for democracy's future is being fought in code and cryptography, in server rooms and security protocols. It's a war we cannot afford to lose.</i>&nbsp;</p>
<div id="lv-root"></div>							]]></description>
		</item>
				<item>
						<pubDate>Fri, 05 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Mastering DDoS Defense with Qrator Labs: Evolving Threats & Mitigation Strategies]]></title>
			<link>https://www.kuppingercole.com/watch/videocast-qrator-ddos-defense</link>
			<guid>https://www.kuppingercole.com/watch/videocast-qrator-ddos-defense</guid>
			<description><![CDATA[ <p><span>DDoS attacks are evolving and becoming more dangerous than ever. In this video, Osman Celik speaks with Andrey Leskin from QRator Labs about the current DDoS attack landscape and how organizations can defend themselves. </span></p>
<p><span>You&rsquo;ll learn: </span></p>
<ul>
<li><span>What DDoS attacks are and how they work across layers 3, 4, and 7 </span></li>
<li><span>Why Layer 7 (application-layer) attacks are the fastest-growing and hardest to detect </span></li>
<li><span>How attackers are building massive botnets (millions of compromised devices) </span></li>
<li><span>Real-world DDoS incidents hitting FinTech, e-commerce, and media sectors </span></li>
<li><span>The differences between scrubbing capacity and PoP proximity in mitigation </span></li>
<li><span>How QRator Labs approaches DDoS protection with scrubbing, anti-bot, and WAF solutions </span></li>
</ul>
<p><span></span><span>With Layer 7 attacks rising by 74% year-over-year and record-breaking volumetric attacks now lasting weeks, no industry can afford to ignore this threat. </span></p>
<p><span>Watch now to understand how to protect your business from DDoS, botnets, and evolving cyber threats.</span></p>				<br/><br/><a href="https://www.kuppingercole.com/watch/videocast-qrator-ddos-defense"><img src="https://www.kuppingercole.com//videothumb/videocast-qrator-ddos-defense/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Martin Kuppinger</dc:creator>			<pubDate>Wed, 03 Sep 2025 12:07:49 +0200</pubDate>
			<title><![CDATA[Email Security]]></title>
			<link>https://www.kuppingercole.com/research/bc81013/email-security</link>
			<guid>https://www.kuppingercole.com/research/bc81013/email-security</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Martin Kuppinger</a></p>Email remains a critical communication channel for organizations, but it is increasingly targeted by sophisticated cyber threats, including phishing, malware, and Business Email Compromise. Despite built-in security features, organizations face the challenge of protecting users and sensitive data across expanding digital platforms without disrupting communication.							]]></description>
		</item>
				<item>
			<dc:creator>Phillip Messerschmidt</dc:creator>			<pubDate>Wed, 03 Sep 2025 11:55:01 +0200</pubDate>
			<title><![CDATA[Operationalization of the KC Identity Fabric and Reference Architecture with a Maturity Model]]></title>
			<link>https://www.kuppingercole.com/blog/messerschmidt/operationalization-of-the-kc-identity-fabric-and-reference-architecture-with-a-maturity-model</link>
			<guid>https://www.kuppingercole.com/blog/messerschmidt/operationalization-of-the-kc-identity-fabric-and-reference-architecture-with-a-maturity-model</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Phillip Messerschmidt</a></p><p class="p1">Identity and Access Management (IAM) is far more complex than many people assume. While it is omnipresent in organizations, it is still frequently treated as a hidden infrastructure service which just needs to &ldquo;work&rdquo; in the background. As a result, IAM is often underestimated, underfunded, and under-strategized. Yet IAM is not simply infrastructure. It is a security service that can enable business growth, digital transformation, and secure collaboration across ecosystems. Without a clear plan, however, IAM quickly becomes an operational burden rather than a strategic advantage.&nbsp;</p>
<h2 class="p1">Identity Fabric &ndash; from concept to practice&nbsp;</h2>
<p class="p1">Over the past years, the Identity Fabric has become a widely recognized foundation for modern IAM. It is no longer an abstract concept, but a strategic framework embraced by vendors, service providers, and enterprises alike. The core idea is straightforward but powerful: Provide seamless, controlled, and secure access for everyone and everything, from any location to any service.&nbsp;</p>
<p class="p1"><em><img src="/pics/KuppingerCole_Identity_Fabric_(Version_2025).png" alt="" />Figure 1: KuppingerCole Identity Fabric (Version 2025)&nbsp;</em></p>
<p class="p1">The Identity Fabric illustrates how different identity types such as employees, customers, partners, devices, and services can interact with target systems. This access is enabled through functional capabilities. These capabilities are bundled into services, and these services are mapped to specific tool categories. In other words, the Identity Fabric turns the abstract question &ldquo;how do we manage access for everyone to everything?&rdquo; into a structured model.&nbsp;</p>
<p class="p1"><em><img src="/pics/The_KuppingerCole_IAM_Reference_Architecture_(Version_2025).png" alt="" />Figure 2: The KuppingerCole IAM Reference Architecture (Version 2025)&nbsp;</em></p>
<h2 class="p1">The Reference Architecture as capability map&nbsp;</h2>
<p class="p1">The KuppingerCole Reference Architecture provides the necessary level of detail to bring the Identity Fabric to life. It is organized as a capability matrix along five functional layers and four domains which are the well-known &ldquo;4 A&rsquo;s.&rdquo; By breaking IAM into clearly defined functional capabilities, the Reference Architecture helps organizations avoid the trap of viewing IAM only as products or tools. Instead, it establishes a structured view of what IAM must achieve and how these achievements fit into a business-aligned security ecosystem.&nbsp;</p>
<p class="p1">This structured approach is not an academic exercise. It is the foundation for achieving a cohesive, adaptable, and future-proof IAM environment. Diving into the Reference Architecture is therefore essential, not only for strategy development but also for handling daily operational demands.&nbsp;</p>
<h2 class="p1">Three ways of operationalization&nbsp;</h2>
<p class="p1">At EIC 2025, KuppingerCole presented the updated version of the Identity Fabric in a workshop and demonstrated three distinct approaches to operationalization:&nbsp;</p>
<ul class="ul1">
<li class="li1"><span class="s1"></span>Flexible Reference Architectures&nbsp;<br />This part highlighted how the Reference Architecture can be used to flexibly change the scope of the Identity Fabric. One major takeaway was the presentation of the new draft version of the CIAM Reference Architecture, showing how customer-specific requirements can be mapped consistently into the same structured approach.&nbsp;<br /><br /></li>
<li class="li1"><span class="s1"></span>Strategic Development&nbsp;<br />Here, KuppingerCole demonstrated how the frameworks can be used to assess an organization&rsquo;s IAM landscape and derive a strategic roadmap in five steps:&nbsp;</li>
<ul>
<li class="li1">Maturity assessment,&nbsp;</li>
<li class="li1">Definition of the target state,&nbsp;</li>
<li class="li1">Gap analysis,&nbsp;</li>
<li class="li1">Identification of action items,&nbsp;&nbsp;</li>
<li class="li1">Roadmap creation.&nbsp;</li>
</ul>
</ul>
<p class="p1">This structured sequence helps organizations move beyond buzzwords and develop a practical, measurable plan for improvement.&nbsp;</p>
<ul class="ul1">
<li class="li1"><span class="s1"></span>Operational Development&nbsp;<br />Finally, the third chapter focused on daily IAM challenges and how do you resolve recurring operational issues with a structured, hands-on mentality. The Identity Fabric and Reference Architecture offer a common language to classify problems, highlight dependencies, and provide a structured pathway toward resolution.&nbsp;</li>
</ul>
<p class="p1">The feedback from this workshop was remarkably positive. Many attendees emphasized that this workshop had helped them greatly by showing them how to translate these frameworks into concrete steps for strategy and operations.&nbsp;</p>
<h2 class="p1">The next step: Maturity as foundation&nbsp;</h2>
<p class="p1">While many organizations confidently state that they already have an IAM strategy, reality often tells a different story. Without a solid understanding of their own current state, these strategies remain vague and aspirational. At EIC 2025, the focus was on showing how to move forward in five steps. At the upcoming Identity Fabric Impact Day (IFID) on September 18, 2025, in Munich, the spotlight will shift to the very first step: The maturity assessment.&nbsp;</p>
<p class="p1">A well-executed maturity assessment provides a structured overview of an organization&rsquo;s functional capabilities. It helps build a common understanding across departments, prevents misunderstandings, and establishes a baseline for measuring progress. It also enables benchmarking against industry leaders transforming subjective assumptions into objective evaluations.&nbsp;</p>
<h2 class="p1">Why maturity matters&nbsp;</h2>
<p class="p1">A maturity assessment is not simply about scoring an organization on a scale. It is about enabling clarity:&nbsp;</p>
<ul class="ul1">
<li class="li1"><span class="s1"></span>Which IAM capabilities exist, and how well are they implemented?&nbsp;</li>
<li class="li1"><span class="s1"></span>Where are the strengths, weaknesses andgaps?&nbsp;</li>
<li class="li1"><span class="s1"></span>How do different levels of maturity interact and depend on each other?&nbsp;</li>
<li class="li1"><span class="s1"></span>What is realistic to achieve as the next step?&nbsp;</li>
</ul>
<p class="p1">Without this clarity, organizations risk investing in the wrong initiatives or trying to adopt trends like Zero Trust or CIAM without having established the operational excellence to support them. The maturity assessment ensures that ambitions are matched with the current reality.&nbsp;</p>
<h2 class="p1">What to expect in Munich&nbsp;</h2>
<p class="p1">At IFID, KuppingerCole will present a five-level maturity assessment model based on the Identity Fabric and the Reference Architecture. The event will provide concrete answers to key questions:&nbsp;</p>
<ul class="ul1">
<li class="li1"><span class="s1"></span>How many maturity levels are really required?&nbsp;</li>
<li class="li1"><span class="s1"></span>Which criteria are important to assess IAM capabilities?&nbsp;</li>
<li class="li1"><span class="s1"></span>How exactly are the levels and criteria defined?&nbsp;</li>
<li class="li1"><span class="s1"></span>How do the different levels relate to each other?&nbsp;</li>
<li class="li1"><span class="s1"></span>Which possibilities exist to improve maturity step by step?&nbsp;</li>
</ul>
<p class="p1">In addition, participants will have the chance to meet directly with KuppingerCole experts, discuss their own challenges, and receive advice on applying these insights in their organizations.&nbsp;</p>
<h2 class="p1">From frameworks to real progress&nbsp;</h2>
<p class="p1">The operationalization of the Identity Fabric and Reference Architecture is not a theoretical exercise. It is about providing clarity, structure, and practical guidance in a complex area that too often suffers from misunderstanding. Focusing on the maturity assessment is the next step and will help organizations establish a transparent foundation for strategic development and operational excellence.&nbsp;</p>
<p class="p1">Join us in Munich on September 18, 2025, to see how KuppingerCole's frameworks can be transformed into actionable insights and how maturity can become the starting point for real progress in IAM.&nbsp;</p>
<div id="lv-root"></div>							]]></description>
		</item>
				<item>
						<pubDate>Wed, 03 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[Jerome Thorstenson on Orphaned Accounts | Identity Fabric Impact Day Speaker Spotlight]]></title>
			<link>https://www.kuppingercole.com/watch/2025-ifid-speaker-spotlight-jerome-thorstenson</link>
			<guid>https://www.kuppingercole.com/watch/2025-ifid-speaker-spotlight-jerome-thorstenson</guid>
			<description><![CDATA[ <p data-pm-slice="1 1 []">Orphaned accounts are one of the most overlooked <strong>cybersecurity risks</strong> &mdash; and attackers know it. These accounts still have access to critical systems, but with no active owner, they become a <strong>hidden backdoor</strong> for breaches. In this video, <strong>Jerome Thorstenson</strong> explains:</p>
<ul>
<li>What orphaned accounts are and why they&rsquo;re so dangerous</li>
<li>Real-world examples of ghost accounts inside payment and production systems</li>
<li>How orphaned and shared accounts create identity management challenges</li>
<li>Best practices for cleanup using <strong>Active Directory, MFA, and PAM (Privileged Access Management)</strong></li>
<li>Why compliance regulations like <strong>NIS2</strong> and <strong>DORA</strong> make orphaned account management more urgent than ever</li>
</ul>
<p>If your organization is serious about <strong>identity and access management (IAM)</strong>, it&rsquo;s time to address orphaned accounts before they turn into the next breach headline.</p>
<p>Learn how to gain visibility, strengthen <strong>access control</strong>, and protect against hidden threats.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/2025-ifid-speaker-spotlight-jerome-thorstenson"><img src="https://www.kuppingercole.com//videothumb/2025-ifid-speaker-spotlight-jerome-thorstenson/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Mike Small</dc:creator>			<pubDate>Mon, 01 Sep 2025 17:30:00 +0200</pubDate>
			<title><![CDATA[Data Backup and Cloud Sovereignty]]></title>
			<link>https://www.kuppingercole.com/blog/small/data-backup-and-cloud-sovereignty</link>
			<guid>https://www.kuppingercole.com/blog/small/data-backup-and-cloud-sovereignty</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Mike Small</a></p><h2 class="KCHead1">Cloud Sovereignty Risks and Data Backup Strategies: How to Protect Business Continuity</h2>
<p><i>Learn how data backup strategies can protect against cloud sovereignty risks&mdash;including legal, operational, and geopolitical threats to business continuity.</i></p>
<p>Cloud services are now at the core of modern businesses, powering everything from real-time customer engagement to AI-driven analytics. However, beneath the promise of speed and scalability lies a geopolitical fault line: cloud sovereignty. For organizations that rely on non-sovereign cloud providers, especially those based in jurisdictions with far-reaching legal powers, this is more than a compliance headache. It is a direct threat to operational continuity, and business resilience as well as data confidentiality.</p>
<p><img src="/pics/Bild1_Mike1.png" alt="" /></p>
<p><img src="/pics/Bild2_Mike.png" alt="" /></p>
<p>Figure 1: How digital sovereignty risks impact data backup strategies.</p>
<p>Data backup, often seen as the <a href="https://www.kuppingercole.com/research/lc80868/cloud-backup-for-ai-enabled-cyber-resilience">last line of defense against cyber-attacks</a>, takes on a strategic role in this context, it is the critical defense needed to survive the digital impact of geopolitical shocks. In this blog I will compare two scenarios for data backup in this context, based on the four sovereignty risks: data sovereignty, operational sovereignty, infrastructure sovereignty, and technology sovereignty.</p>
<h2 class="KCHead2">Risks of Storing Backup Data in a Non-Sovereign Cloud</h2>
<p>In this scenario, backups of data in systems on premises, at the edge or in a sovereign cloud are stored in a non-sovereign cloud. For example, an organization is using a US owned cloud service to hold backups containing personal data relating to EU residents. This is common scenario since hyperscale cloud services are delivered from multiple locations and provide levels of availability, making them <a href="https://www.kuppingercole.com/research/lc80868/cloud-backup-for-ai-enabled-cyber-resilience">ideal for storing backup data</a>.</p>
<p>Foreign laws, such as the US CLOUD Act, may compel a non-sovereign cloud provider to disclose the data, even if it is stored outside the cloud provider's home country. The European Data Protection Board (EDPB) <a href="https://www.edpb.europa.eu/news/news/2021/edpb-adopts-final-version-recommendations-supplementary-measures-letter-eu_en">supplementary measures</a> describe in detail the controls needed to protect EU personal data in this case.&nbsp; These measures are also useful to protect all forms of sensitive data against legal but unauthorized access by a cloud service provider.</p>
<p><strong>Technical Controls </strong></p>
<ul>
<li>Encryption &ndash; strong state of the art encryption can provide adequate protection providing the keys are managed correctly.</li>
<li>Pseudonymization &ndash; as opposed to anonymization, is explicitly allowed providing the additional data needed to reconstitute the data is adequately protected.</li>
<li>The customer retains the encryption keys within their sovereign jurisdiction.</li>
<li>Split-key or Shamir Secret Sharing and other <a href="https://www.kuppingercole.com/research/lc80873/enterprise-secrets-management">secret management techniques</a> can provide extra protection for the keys.</li>
<li>Other confidential <a href="https://www.kuppingercole.com/blog/small/confidential-computing-and-data-sovereignty-in-non-sovereign-clouds">computing techniques</a> must be used to protect backup data that is processed within the non-sovereign cloud.</li>
</ul>
<p><strong>Residual Risks</strong></p>
<ul>
<li>Geopolitical conflicts, sanctions, or government actions could disrupt access to backup data.</li>
<li>Proprietary formats, APIs, and services can make it difficult to restore data from backups if the cloud backup service provider ceases operations or services.</li>
</ul>
<h2 class="KCHead2">Using Sovereign Backups to Reduce Cloud Sovereignty Risks</h2>
<p>In this scenario, an organization uses a non-sovereign cloud to store and process data. For example, an EU organization is using a US owned cloud service to deliver business critical applications. This exposes the organization to four major risks as I outlined in my blog &ldquo;<a href="https://www.kuppingercole.com/blog/small/sovereign-cloud-geopolitical-risks">Why US Isolationism is Now a Global Cloud Risk</a>.&rdquo; In the section above I described how to mitigate data confidentiality risks, here are some examples of how data backup can help to mitigate the other risks.</p>
<p><strong>Infrastructure Sovereignty Risk: Denial of Access</strong></p>
<p>In times of political conflict or sanctions, governments could seize, disable, or restrict access to the cloud infrastructure, disrupting or severing access to critical business operations.</p>
<p><strong>Technical Controls</strong></p>
<ul>
<li>Sovereign backup - storing a backup of your organization&rsquo;s data in a sovereign cloud or physical location within your sovereign jurisdiction ensures that you have an accessible copy. This is particularly important for organizations subject to strategic export controls or operating in politically sensitive sectors.</li>
<li>Infrastructure as code backup - application infrastructure is defined by data, and the backup must also protect this data.</li>
<li>Continuous backup - In a dynamic DevOps environment this infrastructure changes as the application evolves. The backup process must be able to capture these changes and support restoring not just the application data but also the virtual infrastructure that it needs.</li>
</ul>
<p><strong>Residual Risk</strong></p>
<ul>
<li>The time to rebuild workloads in sovereign infrastructure depends on your recovery plan. If this includes migrating the application components to a different technology this may be complex and cause prolonged downtime.</li>
</ul>
<p class="KCBoldHeader"><strong>Technology Sovereignty Risk: Lock-In Becomes Lock-Out </strong></p>
<p>Cloud services are &ldquo;software defined&rdquo; and depend upon a complex technology stack. This involves proprietary hardware and software to deliver a proprietary user environment. While the basic capabilities of networking, storage and computing may support open standards, the user interfaces, tools, and APIs provided by the services are proprietary.</p>
<p>If a non-sovereign government were to legally oblige the cloud service provider to cease providing that service in certain geographies it would be difficult for organizations in those to maintain business continuity.</p>
<p><strong>Technical Controls</strong></p>
<ul>
<li>Use international and open standards when architecting and implementing business critical applications to reduce the risk of technology lock-out.</li>
<li>Standard backup formats - backups of your environment in open, portable formats in your sovereign environment would allow you to restore your workloads to alternative platforms without relying on the provider&rsquo;s proprietary tools.</li>
</ul>
<p><strong>Residual Risk</strong></p>
<ul>
<li>Some workloads rely on proprietary features such as managed databases, AI models, or analytics pipelines that cannot be fully replicated outside of the proprietary cloud environment. Even with portable data formats, migrating applications integrations may require substantial reengineering, which can extend recovery timelines.</li>
</ul>
<h2 class="KCHead2">Conclusion</h2>
<p>Cloud sovereignty risks are no longer abstract, hypothetical threats, they are unfolding in real time as global politics, trade policies, and jurisdictional power plays increasingly intersect with digital infrastructure. For organisations depending upon non-sovereign cloud services, the question is not whether sovereignty-related disruptions might happen, but when and how well prepared your organization will be when they do.</p>
<p>A well-planned backup strategy, whether to a sovereign cloud or physical location, acts as both a safety net and an enabler of digital independence. It provides your organization with resilience against not only cyber threats but also digital sovereignty risks.</p>
<p>By integrating sovereign cloud backups into your data backup strategy, your organization can strengthen business continuity and resilience against cloud sovereignty risks. To explore best practices in data protection and compliance, join us at <a href="https://www.kuppingercole.com/events/iccid2025">Identity-Centric Cybersecurity Impact Day 2025</a> in Frankfurt November 6<sup>th</sup>, 2025.</p>							]]></description>
		</item>
				<item>
			<dc:creator>Paul Fisher</dc:creator>			<pubDate>Mon, 01 Sep 2025 14:31:51 +0200</pubDate>
			<title><![CDATA[The 100-Day Identity Security Plan]]></title>
			<link>https://www.kuppingercole.com/research/wp81281/the-100-day-identity-security-plan</link>
			<guid>https://www.kuppingercole.com/research/wp81281/the-100-day-identity-security-plan</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Paul Fisher</a></p>In 2025, the digital identity landscape became the new battleground for cybersecurity. As organizations increasingly rely on cloud services, remote work environments, and digital transformation initiatives, identity has emerged as both the greatest vulnerability and the most critical security control. Traditional perimeter-based security models have proven inadequate against sophisticated threat actors who now systematically target identity infrastructure as their primary attack vector.
This white paper presents a comprehensive framework for building identity resilience – the ability of an organization's identity ecosystem to withstand, adapt to, and recover from cyber attacks while maintaining operational continuity. 
The paper outlines a strategic 100-day transformation plan that incorporates innovative technologies including Identity Security Posture Management (ISPM), Identity Threat Detection and Response (ITDR), and Identity Recovery (IR) capabilities.							]]></description>
		</item>
				<item>
						<pubDate>Mon, 01 Sep 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[ITDR & Machine Identities (NHIs): Rethinking IAM for Security at Scale]]></title>
			<link>https://www.kuppingercole.com/watch/idtr-nhis-rethinking-iam-for-security</link>
			<guid>https://www.kuppingercole.com/watch/idtr-nhis-rethinking-iam-for-security</guid>
			<description><![CDATA[ <p><span>In this episode of the KuppingerCole Analyst Chat, Matthias Reinwarth is joined by Martin Kuppinger and special guest Felix Gaehtgens to explore two of the hottest (and most debated) topics in identity today: Identity Threat Detection &amp; Response (ITDR) and Non-Human / Machine Identities (NHI). </span></p>
<p><span>Together, they gothrough the buzzwords to reveal what&rsquo;s real, what&rsquo;s hype, and how organizations should approach these fast-evolving areas of IAM. From visibility vs. observability, to governance challenges and the future of machine identity management, this episode delivers sharp insights and practical recommendations from three IAM veterans. </span></p>
<p><span>So tell us &mdash; are ITDR and NHI just marketing buzzwords, or essential must-haves for modern identity security? </span></p>
<p><span>Key topics covered: </span></p>
<ul>
<li><span>ITDR explained: buzzword or meaningful evolution in IAM? </span></li>
<li><span>Why visibility and observability are not the same </span></li>
<li><span>The missing &ldquo;R&rdquo; in detection &amp; response </span></li>
<li><span>IAM vs. SOC responsibilities for ITDR </span></li>
<li><span>Machine identities: terminology, challenges, and governance </span></li>
<li><span>Ephemeral vs. static machine identities </span></li>
<li><span>How IAM teams can prepare for the future of identity security</span></li>
</ul>				<br/><br/><a href="https://www.kuppingercole.com/watch/idtr-nhis-rethinking-iam-for-security"><img src="https://www.kuppingercole.com//videothumb/idtr-nhis-rethinking-iam-for-security/400"></a>			]]></description>
		</item>
				<item>
			<dc:creator>Alejandro Leal</dc:creator>			<pubDate>Thu, 28 Aug 2025 12:21:08 +0200</pubDate>
			<title><![CDATA[Rising Star Authsignal]]></title>
			<link>https://www.kuppingercole.com/research/rs81289/rising-star-authsignal</link>
			<guid>https://www.kuppingercole.com/research/rs81289/rising-star-authsignal</guid>
			<description><![CDATA[ <p>by <a href="https://www.kuppingercole.com/people/">Alejandro Leal</a></p>Authsignal is an emerging vendor in passwordless authentication, offering an API-driven, modular authentication service that integrates effortlessly with existing IDPs. The platform supports various authentication methods, including FIDO2, and emphasizes flexibility and security without major architectural changes, appealing to mid-market enterprises focused on enhancing user experience and transaction safety.							]]></description>
		</item>
				<item>
						<pubDate>Thu, 28 Aug 2025 08:22:31 +0200</pubDate>
			<title><![CDATA[Nov 12, 2025: Separating Signal From Noise in Fraud Reduction Intelligence Platforms for eCommerce]]></title>
			<link>https://www.kuppingercole.com/events/fraud-in-digital-commerce</link>
			<guid>https://www.kuppingercole.com/events/fraud-in-digital-commerce</guid>
			<description><![CDATA[ Fraud in digital commerce is a systemic challenge reshaping how businesses operate online. From synthetic identities engineered with AI to bot-driven abuse at scale, attackers exploit weaknesses faster than enterprises can redesign defenses. The result is a continuous erosion of trust that threatens the foundation of digital marketplaces.							]]></description>
		</item>
				<item>
						<pubDate>Thu, 28 Aug 2025 00:00:00 +0200</pubDate>
			<title><![CDATA[The Signal-Driven Identity Fabric for 2040]]></title>
			<link>https://www.kuppingercole.com/watch/signal-driven-decisions</link>
			<guid>https://www.kuppingercole.com/watch/signal-driven-decisions</guid>
			<description><![CDATA[ <p>Identity Fabric is emerging as the strategic foundation for modern IAM, yet many organizations struggle to align their roadmap with the market. Outdated architectures, siloed solutions, and static access models leave enterprises exposed &mdash; especially in today&rsquo;s hybrid, hyper-connected world.</p>
<p>KuppingerCole&rsquo;s Leadership Compass: Identity Fabrics 2025 offers deep insights into the technologies, trends, and vendors shaping the future of identity architectures. It defines what matters most in a modern IAM architecture: orchestration, signal-driven decisions, and seamless integration across systems and identities.</p>
<p>Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will present key findings from the latest Leadership Compass, highlighting critical requirements for Identity Fabric and offering a detailed perspective on the vendor landscape. He will explain how orchestration and signals are redefining identity decisions and how organizations can evolve from legacy IAM to future-ready infrastructure.</p>
<p>This session is essential for IT leaders seeking to benchmark their current IAM strategies, explore technology options, and align their long-term identity roadmap with market direction.</p>				<br/><br/><a href="https://www.kuppingercole.com/watch/signal-driven-decisions"><img src="https://www.kuppingercole.com//videothumb/signal-driven-decisions/400"></a>			]]></description>
		</item>
			</channel>
</rss>
