Container security solutions are comprehensive tools designed to protect containerized applications and their underlying infrastructure throughout the software development lifecycle, from…
Read MoreResearch
Stan Wisseman
Stan Wisseman is a seasoned cybersecurity professional with experience spanning roles like Security Engineer, CISO, and Chief Strategist. He’s passionate about…
Learn MoreGigaOm Key Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read MoreGigaOm Key Criteria for Evaluating Secure Access Service Edge (SASE) Solutions
Secure access service edge (SASE) is a cloud-based architecture converging networking and security functions into a unified, scalable solution to address…
Read MoreGigaOm Key Criteria for Evaluating Ransomware Prevention Solutions
Ransomware continues to be a high-priority threat for all organizations, and as with all cybersecurity challenges, the threat continues to evolve…
Read MoreGigaOm Key Criteria for Evaluating Software Supply Chain Security (SSCS) Solutions
Software supply chain security (SSCS) solutions are a blend of specialized technologies and tools designed to protect the entire software development…
Read MoreGigaOm Key Criteria for Evaluating Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based solution that provides on-demand security testing to organizations. It offers continuous vulnerability…
Read MoreWhere’s Security Going in 2025?
Few areas of technology are moving as fast as security, so what gives and how is it going to evolve in…
Read MoreGigaOm Radar for Application & API Security
Application and API security encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs from…
Read MoreGigaOm Radar for Data Security Platforms
Poorly managed and inadequately secured data leaves organizations at risk of a data breach and increases the costs of storage and…
Read MoreGigaOm Radar for Container Security
Container security technology is a critical component of modern application security, providing comprehensive protection for containerized applications and infrastructure throughout their…
Read MoreGigaOm Radar for Ransomware Prevention
Ransomware remains a high-priority threat for all organizations, continuously evolving alongside the growing sophistication of attackers and their tools. Attacks are…
Read MoreNavigating Technological Sovereignty in the Digital Age
Depending on who you speak to, technological sovereignty is either a hot topic, or something that other organizations need to deal…
Read MoreGigaOm Radar for Software Supply Chain Security
Software supply chain attacks have become highly visible due to extensive media coverage such as of the Solarwinds attack in 2020…
Read MoreGigaOm Radar for Cloud Network Security
Cloud network security solutions provide a suite of security services for single- and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreGigaOm Radar for Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based cybersecurity solution that provides continuous, automated security testing capabilities. It enables organizations…
Read MoreGigaOm Key Criteria for Evaluating Cloud Network Security Solutions
Cloud network security solutions provide a suite of security services for single and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreSeth Byrnes
Seth Byrnes has extensive experience in developing strategic roadmaps, implementing robust technology solutions, and leading cross-functional teams to drive operational excellence.
Learn MoreThe Case for Security.txt
In today’s cybersecurity landscape, it’s not just about having robust defenses—it’s also about building trust and partnerships with the wider security…
Read MoreGigaOm Key Criteria for Evaluating Cloud-Native Application Protection Platforms (CNAPPs)
Cloud-native application protection platforms (CNAPPs) are comprehensive security solutions designed to safeguard cloud-native applications and workloads throughout their entire lifecycle. These…
Read MoreDiscovering Disruptions in Tech – With Rajesh Khazanchi of ColorTokens
GigaOm’s Howard Holton is joined by #ColorTokens CEO Rajesh Khazanchi to discuss microsegmentation and security. #BeBreachReady
Watch NowGigaOm Radar for Cloud-Native Application Protection Platforms (CNAPPs)
Cloud-native application protection platforms (CNAPPs) are a blend of technologies that address the complex security challenges of modern cloud-native environments. CNAPP…
Read MoreDiscovering Disruptions in Tech – with Will Gragido of Netwitness at Blackhat
GigaOm’s Howard Holton sits down with Netwitness Chief Product Officer Will Gragido to discuss Data Science and security at Blackhat.
Watch NowDiscovering Disruptions in Tech – With Brian Reed of Proofpoint at Blackhat
GigaOm’s Howard Holton sits down with Brian Reed, Sr. Director of Strategy for Proofpoint at Blackhat to discuss Threat Management and…
Watch Now