The domain name system (DNS) is fundamental to every modern organization. It’s the global web address book without which communications networks,…
Read MoreResearch
Key Criteria for Evaluating Attack Surface Management Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreKey Criteria for Evaluating Application and API Security Solutions
Modern applications are composed of the application itself and the application programming interfaces (APIs) that represent application subsystems. Recent trends in…
Read MoreKey Criteria for Evaluating Network Access Control Solutions
Network access control (NAC) lies at the intersection of network security and visibility. It offers visibility over all network entities and…
Read MoreSecurity Information and Event Management: A MITRE ATT&CK Framework Competitive Evaluation
Security information and event management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (near…
Read MoreGigaOm Radar for User and Entity Behavior Analysis
Cybersecurity is a multidisciplinary practice experiencing a fast rate of change and growing complexity. In response, vendors are evolving their technology…
Read MoreGigaOm Radar for Managed Security Services: Managed Detection and Response (MDR)
All businesses face significant and complex cybersecurity challenges. Threats are constant and evolving rapidly; they can be targeted or random, malicious…
Read MoreGigaOm Radar for Unified Endpoint Management
Endpoint management is one of the most significant challenges in the enterprise today. The world continues to change, with increasingly large…
Read MoreGigaOm Radar for Development Security
Development security is not a new topic, but the need for it is the strongest it has ever been. Security was…
Read MoreGigaOm Radar for Governance, Risk, and Compliance
Governance, risk, and compliance (GRC) is an approach to the assessment and measurement of operational business risk. It includes the ability…
Read MoreKey Criteria for Evaluating Governance, Risk, and Compliance Solutions
Governance, risk, and compliance (GRC) is an approach to the assessment and measurement of business or operational risk. It includes the…
Read MoreKey Criteria for Evaluating Unified Endpoint Management Solutions
Endpoint management is one of the most significant challenges in the enterprise today. Distributed and flexible work arrangements are quickly becoming…
Read MoreKey Criteria for Evaluating Managed Security Services
All businesses face significant and complex cybersecurity challenges. Threats are constant and evolving rapidly; they can be targeted or random, malicious…
Read MoreKey Criteria for Evaluating Development Security Solutions
Development security solutions help development and security teams detect code vulnerabilities earlier and resolve them faster; they’re useful to any development…
Read MoreKey Criteria for Evaluating User and Entity Behavior Analytics Solutions
Cybersecurity is a multidisciplinary practice experiencing a fast rate of change and growing complexity. In response, vendors are evolving their technology…
Read MoreCybersecurity in the mid-market: Playing catch-up in a cold budgetary climate
In a previous article, I said how important it was for mid-market organizations to spend on security – “The more you…
Read MoreChoosing the Right Solution for Cloud Firewall
Transitioning a company’s applications to the cloud—whether cloud-only, multicloud, or hybrid cloud—introduces significant challenges, foremost among them being the impact the…
Read MoreLet’s kill email! Cybersecurity as a driver to better communication strategy
Email has been around for a while, and I really do mean a while: it was first conceived back in…
Read MoreBrody Wright
Brody is an Associate Engineer who tests and writes about technologies for GigaOm. Brody received his first 166mhz Intel Based Desktop,…
Learn MoreABAC vs RBAC: The Advantage of Attribute-Based Access Control over Role-Based Access Control
Data security has become an undeniable part of the technology stack for modern applications. No longer an afterthought, protecting application assets—namely…
Read MoreApplication and API Protection Solutions
Modern applications are composed of the application itself and the APIs that represent application subsystems. API-first approaches, service-oriented architectures, and microservices…
Watch NowExtended Detection and Response (XDR) Solutions
Extended detection and response (XDR) is an innovative threat technology that distributes detection and response across the security stack. It provides…
Watch NowAttack Surface Management Solutions
An attack surface management (ASM) solution addresses any piece of an organization’s technology infrastructure that an attacker can interact with or…
Watch NowGigaOm Radar for Container Security
The infrastructure surrounding containers is complex on many levels. Registries hold container images from base image to complete application image. Container…
Read More