Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in…
Read MoreResearch
CxO Decision Brief: Mobile Threat Defense (MTD)
This GigaOm CxO Decision Brief commissioned by Zimperium. Mobile devices are integral to corporate operations yet remain a vulnerable target for…
Read MoreGigaOm Radar for Identity Threat Detection and Response (ITDR)
Identity is an essential part of any organization’s IT infrastructure, acting as the means to control access to the applications and…
Read MoreGigaOm Benchmark: Achieving Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm Benchmark Report was commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery represents a paradigm shift in how enterprises address cyber recovery…
Read MoreGigaOm Key Criteria for Evaluating Network Detection and Response (NDR) Solutions
Today’s IT infrastructure is becoming increasingly complex as it encompasses hybrid cloud and on-premises environments, IoT devices, and third-party providers. As…
Read MoreEverything Your Parents Told You About Posture Is True! Even For Data Security
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreGigaOm Radar for Data Security Posture Management (DSPM)
Data security posture management (DSPM) solutions provide visibility into where sensitive data is, who has access to it, and how it…
Read MoreSSE vs. SASE: Which One is Right for Your Business?
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises…
Read MoreThere’s Nothing Micro About Microsegmentation
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments…
Read MoreGigaOm Radar for Security Service Edge (SSE)
Designed to address the evolving needs of modern enterprises as they navigate the complexities of cloud adoption, remote work, and digital…
Read MoreThe Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity’s Next Generation
Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was…
Read MoreGigaOm Key Criteria for Evaluating Identity Threat Detection and Response (ITDR) Solutions
Identity management is an essential part of any organization’s IT infrastructure because it serves as the means to control access to…
Read MoreGigaOm Radar for Extended Detection and Response (XDR)
Enterprise cybersecurity comprises multiple security solutions from various vendors. Solutions are typically combined with a security information and event management (SIEM)…
Read MoreGigaOm Key Criteria for Evaluating Data Security Posture Management (DSPM) Solutions
Data is core to all organizations and should be treated as an essential asset. As the data landscape continues to evolve,…
Read MoreCxO Decision Brief: Elevate Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief commissioned by Commvault. Commvault® Cloud Cleanroom™ Recovery has emerged as a pivotal solution for organizations and…
Read MoreCxO Decision Brief: Advancing Data Governance with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief was commissioned by Commvault. Data executives are primarily concerned with data management, emphasizing the governance, quality,…
Read MoreCxO Decision Brief: Enhancing Cyber Resilience with Commvault Cloud Cleanroom Recovery
This GigaOm CxO Decision Brief commissioned by Commvault. Let’s be clear: It’s not a matter of if or when your organization…
Read MoreNavigating the SEC Cybersecurity Ruling
The latest SEC ruling on cybersecurity will almost certainly have an impact on risk management and post-incident disclosure, and CISOs will…
Read MoreGigaOm Radar for Microsegmentation
Microsegmentation solutions define and enforce per-entity communications policies. In this context, an entity can be any information technology (IT) or operational…
Read MoreGigaOm Key Criteria for Evaluating Extended Detection and Response (XDR) Solutions
Enterprise cybersecurity is composed of multiple security solutions from various vendors combined with a security information and event management (SIEM) and/or…
Read MoreGigaOm Key Criteria for Evaluating Microsegmentation Solutions
Microsegmentation solutions isolate single entities on networks by restricting inbound traffic, minimizing a malicious actor’s potential for lateral movement. A more…
Read MoreThe Time is Right to Review Your Enterprise Firewalls
Firewalls, we all have one. It’s a well-established market, full of vendors with mature stacks of technology. Firewalls do a number…
Read MoreCIEM: Bridging the Gap Between IAM and Cloud Security
The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire…
Read MoreSpringing the Trap: Snagging Rogue Insiders with Deceptive Tactics
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges…
Read More