In the ever-evolving landscape of information technology, the ability to effectively manage and enforce security policies has become paramount. Policy-as-code solutions…
Read MoreResearch
GigaOm Key Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach organizations. Successful phishing attacks lead to the loss of…
Read MoreGigaOm Key Criteria for Evaluating Cloud Access Security Broker (CASB) Solutions
A cloud access security broker (CASB) is a technology solution that acts as an intermediary between users and cloud service providers,…
Read MoreMonitoring and Analytics: The Eyes and Ears of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and…
Read MoreRedefining Cybersecurity: Leveraging AI for Proactive Defense
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu…
Read MoreSecuring APIs: The Cornerstone of Zero Trust Application Security
Welcome to the latest installment of our zero trust blog series! In our previous post, we explored the importance of application…
Read MoreGigaOm Key Criteria for Evaluating SaaS Security Posture Management (SSPM) Solutions
Software as a service (SaaS) has been a major boon to productivity, enabling business units and users to get exactly the…
Read MoreSecuring Applications: Zero Trust for Cloud and On-Premises Environments
Welcome back to our zero trust blog series! In our previous post, we discussed the importance of device security and explored…
Read MoreGigaOm Radar for Operational Technology (OT) Security
Operational technology (OT) security solutions are crucial for organizations aiming to fortify their defenses and safeguard their assets from an array…
Read MoreDiscovering Disruptions in Technology with Chris Heard of Olive
COO Howard Holton meets with Olive CEO Chris Heard to discuss how platforms can enable democratization.
Watch NowDiscovering Disruptions in Tech – Cradlepoint
COO Howard Holton meets with Anubhav Arora who leads the security engineering teams at Cradlepoint to discuss Zero-Trust security.
Watch NowGigaOm Key Criteria for Evaluating Zero-Trust Network Access (ZTNA) Solutions
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read More