Europe’s leading Analysts on the topics of Information Security in the era of Digital Transformation
KuppingerCole Analysts AG is an international, independent analyst organization offering technology research, neutral advice and events in Identity Management, Cybersecurity and Artificial Intelligence. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.
If I were to speculate, it would be that Crowdstrike has probably become very top heavy and there were 50 managers from many levels breathing down the neck of some poor 15 year old hacker kid they "hired" to do the real work and when that kid passed out from exhaustion at his computer his head hit the keybord and prematurely initiated the update process. But yeah, crappy ring 0 code that doesn't validate it's input and is a key component of high value mission critical computing resources all over the world? WTF? And how come Apple can get rid of KEXTs but the EU won't let Microsoft do similar? This whole thing wreaks of incompetence in too many areas.
Actually, I am sure they have plenty of senior programmers involved throughout the development process. The problem was nevertheless a management one and the fact that the company has previously not been punished for such failure as they essentially have a monopoly on the market or there are simply no better alternatives. So, they concentrated on features and marketing not stability and reliability. As for the EU story, that is a myth.
It has only required a quarter-century of expanding cyber-dependency, for no good reason other than the making of easy fortunes, to prove what I already knew before Y2K: that analog technology, representing thousands of years worth of human development and achievement, was superior in every way all along.
10:40 "People need to forced apparently. Hahah." Yes, to generate state-planned business models for the cost of the general public. Everybody loves to profit from socialism ignoring the consequences. Risk-Management is just some BS regulation/compliance nonense. Look at the banking sector.
Fascinating conversation! Continuous authentication sounds problematic and intrusive, and yet still not exhaustively protective. Lets say an active agent with all necessary and correct authentication privileges is compromised by outside actors, coercively leading to malignant behaviours, effects known or unknown by the active agent - there seems to be no fail-safe way to protect against attacks regardless of how sure one can be of any single individual identity. Ultimately, the networks of relationship-between edges is of a higher order importance than identity of nodes; ie the mesh of relationships must self-reinforce with confidence.
Hi Matthias and Annie, lovely talk, thank you. Somehow the transcript for the video has been mixed up with another. Would appreciate seeing the real thing for a fuller dive ïĐ
It’s actually pretty easy, security for AI interfacing projects. Since many models are poorly understood we don’t even have a concept for actually securing them from either inadvertent failures or malicious actors. Many current paradigms make current testing procedures obsolete. We need to develop new ones fast.
Hi! Marina and Martin Kuppinger held a presentation on a research study at EIC. Martin published it on LinkedIn, where you can download it for free: www.linkedin.com/posts/martinkuppinger_the-state-and-future-of-digital-identity-activity-7069287395178737664-339Z? Is that what you're looking for? :)
By 1994 the NSF solicitation 93 was already implemented, the commercial Internet exchange was starting to route traffic and a major cultural shift has begun, the realization of the 1963 memo on the Intergalactic Computer Network described by Licklider. The part of the keynote about rights and connecting people to services is spot on. Not just information, but information that can do something useful. Which again fulfilled a great deal of simplification from what was previously quite difficult and cumbersome, like IOT that required a basement of relays in the early radio era where most of this was first imagined.
Hi Navaneetha, you can download the slides from all session of the event on the event page (www.kuppingercole.com/events/identity-fabrics-iam) for free with a KuppingerCole Account.
I'm happy to see you guys are doing well. As for me, I'm a DBA and an ISSO at Langley AFB. I love my job and I work for people with reasonable expectations. It's my last stop.