Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s to provide a set of tools and…
Read MoreResearch
GigaOm Radar for Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions shift security analysts’ focus from repetitive tasks to investigating only the most important incidents. These…
Read MoreDiscovering Disruptions in Tech – with Doron Peri of Scribe Security at Blackhat
GigaOm’s Howard Holton sits down with Doron Peri, VP of Product at Scribe Security to discuss software supply chain and other…
Watch NowGigaOm Radar for API Security
Application programming interfaces (APIs) serve as the vital connection between applications, services, and systems. API security solutions are specialized technologies designed…
Read MoreGigaOm Radar for Insider Risk Management
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders. Insiders are people…
Read MoreDiscovering Disruptions in Tech, at Black Hat with Gaurav Kulkarni of Sprocket Security
GigaOm’s Howard Holton sits down with Gaurav Kulkarni of Sprocket Security to discuss security and threat management at Blackhat, aka Hacker…
Watch NowDiscovering Disruptions in Tech at Blackhat with Scott Hogrefe of Netskope
GigaOm’s Howard Holton sits down with Scott Hogrefe of Netskope to discuss security, threat management, and other related topics at Blackhat.
Watch NowDiscovering Disruptions in Tech – At Blackhat with Marshall Hielman of DTEX
Howard Holton is joined by DTEX’s Marshall Hielman at Blackhat to discuss cyber security and other topics from the conference.
Watch NowDiscovering Disruptions in Tech – Semantic Layers with David Jayatillake of Cube
CCO Howard Holton is joined by David Jayatillake of Cube to discuss semantic layers and their importance in the tech industry.
Watch NowThe Impact of GenAI on Data Loss Prevention
Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but…
Read MoreIdentity, Endpoint, and Network Security Walk into a Bar
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally…
Read More“Gone Phishing”—Every Cyberattacker’s Favorite Phrase
Phishing—how old hat is that as a topic? Isn’t it solved for most of us by now? Can’t we speak about…
Read MoreSecurity Policy as Code: An Architect’s Perspective on the Evolving Landscape
I have always been intrigued by how security marries automation in infrastructure. Defining and managing security policies as code in what…
Read MoreGigaOm Radar for Continuous Vulnerability Management (CVM)
Vulnerability management is now a cornerstone of digital security frameworks and should be a part of every organization’s cybersecurity plan. This…
Read MoreGigaOm Radar for Application Security Testing (AST)
In the face of relentless cyber threats and an ever-expanding attack surface, robust application security testing (AST) has become an indispensable…
Read MoreGigaOm Solution Profile: Cogility TacitRed
This GigaOm Solution Profile commissioned by Cogility. Cogility TacitRed provides security analysts with continuous external threat intelligence, offering evidence-based, prioritized insights…
Read MoreGigaOm Radar for Data Loss Prevention (DLP)
Data is a precious resource for today’s enterprises, and preventing its loss is of paramount importance. The cost of data loss…
Read MoreDiscovering Disruptions in Tech with Rob McNutt of Forescout
Forescout’s SVP of Network Security Rob McNutt joins GigaOm COO Howard Holton at Blackhat to discuss cyber security in tech today.
Watch NowDiscovering Disruptions in Tech with Matt Hum of DEFCON at Blackhat
COO Howard Holton is joined by Matt Hum at Blackhat to discuss the state of security and threats like ransomware in…
Watch NowDiscovering Disruptions in Tech – At Blackhat with Ziv Dines of Armis
GigaOm CTO Howard Holton is joined by fellow CTO Ziv Dines of Armis at Black Hat, a hacker’s summer camp, to…
Watch NowDiscovering Disruptions in Tech at Blackhat with Chandra Sekar of AppOmni
Howard Holton travels to Blackhat to discuss security with Chandra Sekar, the CMO at AppOmni.
Watch NowGigaOm Radar for Secure Enterprise Browsing
Secure enterprise browsing solutions enable users to access websites and web-based resources in compliance with corporate security policies and provide security…
Read MoreThe Good The Bad & The Techy – Identity Security with Tyler Reese
Howard Holton and Jon Collins meet with Tyler Reese of Netwrix to discuss identity security.
Watch NowThe Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis
In the ever-evolving cyberthreat landscape, cybercriminals are deploying sophisticated methods to exploit network vulnerabilities while organizations constantly seek new ways to…
Read More