Phishing has long been and remains the leading method used by cybercriminals in attempts to breach organizations. Successful phishing attacks lead…
Read MoreResearch
GigaOm Radar for Security Information and Event Management (SIEM)
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read MoreThe Good, The Bad, & The Techy: The Cloudstrike Outage
CTO Howard Holton, and VP Engagement Jon Collins are joined by Production Manager Johnny Baltisberger to discuss the recent Windows Outage…
Watch NowGigaOm Key Criteria for Evaluating Continuous Vulnerability Management (CVM) Solutions
A decade ago, vulnerability management relied primarily on network-based scanning, which used common TCP and UDP ports to gather data. That…
Read MoreGigaOm Radar for Network Detection and Response (NDR)
Network detection and response (NDR) solutions represent a critical evolution in cybersecurity. Designed to address the increasingly sophisticated and varied nature…
Read MoreGigaOm Key Criteria for Evaluating Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under one roof. Initially, SIEM solutions supported early detection…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreDiscovering Disruptions in Tech – Is Cybersecurity Broken?
COO Howard Holton is joined by Shlomo Kramer of Cato networks to discuss the state of cybersecurity, and it’s ramifications on…
Watch NowGigaOm Radar for Enterprise Password Management
Every organization has employees who are buried in username and password combinations for both business and personal use. The average user…
Read MorePutting It All Together: Getting Started with Your Zero Trust Journey
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices,…
Read MoreGovernance and Compliance: Aligning Zero Trust with Business Requirements
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration…
Read MoreAutomation and Orchestration: The Backbone of Zero Trust
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of…
Read More