Analyst Perspectives


Search within Analyst Perspectives blog:

TopBar aaaaa BottomBar

Currently Showing:

  • for Topic: Cybersecurity
  • Available Posts: 0

The shift toward a Zero Trust Network Access (ZTNA) framework is a strategic move for enterprises aiming for an enhanced security posture. ZTNA operates on the principle of "never trust, always verify," ensuring that every user and device is authenticated and authorized before accessing resources. In this context, Privileged Access Management (PAM) emerges as a critical enabler for an effective...

Read More

Topics: Cybersecurity, IT & Technologies, Identity and Access Management, PAM, IAM, ZTNA, Privileged Access, Zero Trust


The annual RSAC Conference took place in late April in San Francisco, where over 40,000 professionals from the cybersecurity industry converged at the Moscone Center to discuss the latest trends, products and services aimed at threat identification and organizational security.

Read More

Topics: Cybersecurity, GenAI, IT & Technologies, Agentic AI, EDR, XDR, PAM, SIEM, IAM, Quantum, Threat Intelligence, SOAR, Data Recovery, Data Resilience, ZTNA


As quantum computing advances at an unprecedented pace, the concept of Q-Day—a day when quantum computers can fundamentally undermine our current encryption methods—has entered discussions among cybersecurity professionals and business leaders alike. While there is no definitive date set for Q-Day, we are approaching a critical juncture where traditional cryptographic techniques may no longer...

Read More

Topics: Digital Technology, Cybersecurity, Digital Security


In an era defined by the relentless advance of cyber threats, enterprise security leaders grapple with an overwhelming landscape. Enterprises face complex challenges as sophisticated attacks and increasing responsibilities stretch security teams thin. Many describe daily experiences as perpetual "firefighting," trapped in cycles of reacting to incidents rather than developing proactive strategies...

Read More

Topics: Digital Technology, Cybersecurity


In a defining moment for the artificial intelligence (AI) sector, the recent breach involving Chinese company Liang Wenfeng (makers of DeepSeek AI) has shed light on the emerging cyber threats that challenge the industry. The reported incident revealed that DeepSeek AI had left its ClickHouse database accessible to the public, exposing over one million lines of log entry data. This data included...

Read More

Topics: Digital Technology, Cybersecurity, Generative AI, DeepSeek, OpenAI


The structures that govern enterprise security teams are under scrutiny. A recent report from a government watchdog group has taken issue with Microsoft’s cybersecurity strategies in the wake of its Exchange Server attacks, prompting the enterprise software giant to re-evaluate its reporting structures. The implications of this shift extend beyond Microsoft itself, with cybersecurity becoming a...

Read More

Topics: Digital Technology, Cybersecurity, CISO


The necessity of business continuity came to a reality with the pandemic in early 2020, with the requirement to avoid the risk of interruption to the fundamentals of an organization. I outlined this challenge in my perspective, “The Business Continuity Imperative: The Workforce Experience and Human Capital Management in 2020 and Beyond.” Ensuring that software in cloud computing environments is...

Read More

Topics: Cybersecurity, Ransomware, UKG


We now are well beyond the year depicted in 2001: A Space Odyssey, a cinematic perspective on the future of artificial intelligence in which HAL 9000, a computer, is able to simulate human behavior and control machines. Anyone reviewing the past two years of marketing around AI in the business technology industry can be forgiven for believing that we have arrived at the futuristic state Stanley...

Read More

Topics: Big Data, Data Science, Mobile, Customer Analytics, Customer Engagement, Customer Experience, Machine Learning, Mobile Technology, Analytics, Business Intelligence, Cloud Computing, Collaboration, Customer Service, Data Governance, Data Integration, Data Preparation, Internet of Things, Contact Center, Information Optimization, Digital Technology, Machine Learning and Cognitive Computing, Cybersecurity, Billing and Recurring Revenue, Workforce Optimization, collaboration for business


We are have arrived at the May 25, 2018 date when the European Union’s General Data Privacy Regulations (GDPR) become enforceable, following what has been a two-year transition period. Companies were given this time to put in place reasonable measures and the systems necessary to support the legislation’s wide-ranging personal data privacy requirements, which apply to any organization with more...

Read More

Topics: Big Data, Data Science, Mobile, Sales, Customer Analytics, Customer Engagement, Customer Experience, Marketing, Analytics, Business Intelligence, Cloud Computing, Collaboration, Data Governance, Data Integration, Data Preparation, Internet of Things, Contact Center, Digital Technology, Digital Marketing, Digital Commerce, Cybersecurity, Billing and Recurring Revenue, collaboration for business, mobile marketing



Posts by Topic

see all

Posts by Month

see all