As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB)…
Read MoreResearch
Are We Taking Enterprise Password Management Seriously?
Passwords are the keys to your digital assets: it’s how we access applications and data, as well as infrastructure and systems.…
Read MoreThe Future of ZTNA: A Convergence of Network Access Solutions
Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data…
Read MoreSaaS Security Posture—It’s not you, it’s me!
In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure,…
Read MoreNavigating the Unique Landscape of OT Security Solutions
Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements…
Read MoreGigaOm Key Criteria for Evaluating API Security Solutions
Application programming interfaces (APIs) are now central to modern software development, but as their use has skyrocketed, intrusions that successfully exploit…
Read MoreCxO Decision Brief: Offensive Security Testing and Pentest as a Service
This GigaOm CxO Decision Brief commissioned by Cobalt. Offensive Security Testing (OST) is a proactive approach to cybersecurity that encompasses traditional…
Read MoreOperations Leadership Lessons from the Crowdstrike Incident
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past…
Read MoreGigaOm Radar for SaaS Security Posture Management (SSPM)
Software as a service (SaaS) product offerings have been a major boon to productivity. Teams and businesses have gotten exactly the…
Read More5G for Connected Workers: Transforming Remote Work
This GigaOm report was commissioned by T-Mobile. The advent of 5G technology is revolutionizing a wide range of industries, especially for…
Read MoreGigaOm Radar for Cloud Access Security Broker (CASB)
Cloud access security broker (CASB) solutions act as an intermediary between users and cloud service providers, providing visibility, control, and security…
Read MoreGigaOm Radar for Security Policy as Code
In the ever-evolving landscape of information technology, effectively managing and enforcing security policies has become increasingly challenging and critical. Policy-as-code solutions…
Read MoreWhy isn’t “Just SIEM” Enough?
There’s a legacy connotation attached to SIEM that has led to vendors advertising themselves as some iteration of a next-generation solution.…
Read MoreCxO Decision Brief: Secure Mobility with T-Mobile 5G
This GigaOm CxO Decision Brief commissioned by T-Mobile. T-Mobile Secure Access Service Edge (SASE) with T-SIMsecure addresses the critical need for…
Read MoreGigaOm Radar for Anti-Phishing
Phishing has long been and remains the leading method used by cybercriminals in attempts to breach organizations. Successful phishing attacks lead…
Read MoreGigaOm Radar for Security Information and Event Management (SIEM)
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read MoreThe Good, The Bad, & The Techy: The Cloudstrike Outage
CTO Howard Holton, and VP Engagement Jon Collins are joined by Production Manager Johnny Baltisberger to discuss the recent Windows Outage…
Watch NowGigaOm Key Criteria for Evaluating Continuous Vulnerability Management (CVM) Solutions
A decade ago, vulnerability management relied primarily on network-based scanning, which used common TCP and UDP ports to gather data. That…
Read MoreGigaOm Radar for Network Detection and Response (NDR)
Network detection and response (NDR) solutions represent a critical evolution in cybersecurity. Designed to address the increasingly sophisticated and varied nature…
Read MoreGigaOm Key Criteria for Evaluating Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under one roof. Initially, SIEM solutions supported early detection…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreDiscovering Disruptions in Tech – Is Cybersecurity Broken?
COO Howard Holton is joined by Shlomo Kramer of Cato networks to discuss the state of cybersecurity, and it’s ramifications on…
Watch NowGigaOm Radar for Enterprise Password Management
Every organization has employees who are buried in username and password combinations for both business and personal use. The average user…
Read MorePutting It All Together: Getting Started with Your Zero Trust Journey
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices,…
Read More