Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration…
Read MoreResearch
Automation and Orchestration: The Backbone of Zero Trust
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of…
Read MoreGigaOm Key Criteria for Evaluating Security Policy-as-Code Solutions
In the ever-evolving landscape of information technology, the ability to effectively manage and enforce security policies has become paramount. Policy-as-code solutions…
Read MoreGigaOm Key Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach organizations. Successful phishing attacks lead to the loss of…
Read MoreGigaOm Key Criteria for Evaluating Cloud Access Security Broker (CASB) Solutions
A cloud access security broker (CASB) is a technology solution that acts as an intermediary between users and cloud service providers,…
Read MoreMonitoring and Analytics: The Eyes and Ears of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and…
Read MoreRedefining Cybersecurity: Leveraging AI for Proactive Defense
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu…
Read MoreSecuring APIs: The Cornerstone of Zero Trust Application Security
Welcome to the latest installment of our zero trust blog series! In our previous post, we explored the importance of application…
Read MoreGigaOm Key Criteria for Evaluating SaaS Security Posture Management (SSPM) Solutions
Software as a service (SaaS) has been a major boon to productivity, enabling business units and users to get exactly the…
Read MoreSecuring Applications: Zero Trust for Cloud and On-Premises Environments
Welcome back to our zero trust blog series! In our previous post, we discussed the importance of device security and explored…
Read MoreGigaOm Radar for Operational Technology (OT) Security
Operational technology (OT) security solutions are crucial for organizations aiming to fortify their defenses and safeguard their assets from an array…
Read MoreDiscovering Disruptions in Technology with Chris Heard of Olive
COO Howard Holton meets with Olive CEO Chris Heard to discuss how platforms can enable democratization.
Watch NowDiscovering Disruptions in Tech – Cradlepoint
COO Howard Holton meets with Anubhav Arora who leads the security engineering teams at Cradlepoint to discuss Zero-Trust security.
Watch NowGigaOm Key Criteria for Evaluating Zero-Trust Network Access (ZTNA) Solutions
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreSecuring Endpoints: Zero Trust for Devices and IoT
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the importance of network…
Read MoreMicrosegmentation: Implementing Zero Trust at the Network Level
Welcome back to our zero trust blog series! In our previous post, we explored the importance of data security and identity…
Read MoreSecuring Identities: The Foundation of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into data security, exploring…
Read MoreDiscovering Disruptions in Technology – Netwrix
COO Howard Holton is joined by Tyler Reese, the Director of Product at Netwrix to discuss identity management.
Watch NowProtecting Your Crown Jewels
Welcome back to our zero trust blog series! In the previous posts, we introduced the concept of zero trust and explored…
Read MoreDiscovering Disruptions in Technology with Nokia’s Rodrigo Brito
Nokia’s Head of Cybersecurity Products, Rodrigo Brito, stops by to discuss RSA and cybersecurity in telecom with COO Howard Holton.
Watch NowBuilding Blocks of Zero Trust: A Comprehensive Guide
In our previous post, we introduced the concept of zero trust and explored why it’s becoming an essential approach to cybersecurity…
Read MoreZero Trust 101: It’s Time to Ditch “Trust but Verify”
Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Password Management Solutions
Employees everywhere are buried in username and password combinations for both business and personal use. The average user has dozens, if…
Read MoreGigaOm Key Criteria for Evaluating Operational Technology (OT) Security Solutions
Operational technology (OT) security solutions are an essential tool for organizations striving to secure their assets and protect against threats. OT…
Read More