Application development and deployment architecture have been changing to accommodate new platforms, processes, and application needs. Increasingly, applications are collections of…
Read MoreResearch
Key Criteria for Evaluating Zero-Trust Network Access Solutions
Virtual private networks (VPNs) have traditionally been the default method of secure remote access. They provided an alternative to exposing internal…
Read MoreDon MacVittie
Don MacVittie has more than 25 years of technology industry experience, working in nearly every IT position in a wide variety…
Learn MoreGigaOm Radar for Attack Surface Management
The difficulties and challenges of rapid digital growth, cloud adoption, and sprawling public internet space create a bonanza of opportunities for…
Read MoreGigaOm Radar for Governance Risk and Compliance Solutions
Risk and risk management should be a driving force within IT departments. However, for most enterprises, risk management is considered a…
Read MoreSecurity Brain Wave
Health providers are a prime target for cyberattacks, having stewardship of the most intimate personal data covering vast numbers of people.…
Read MoreKey Criteria for Evaluating Application and API Protection Solutions
Modern applications are composed of the application itself and the APIs that represent application subsystems. Recent trends in application development—including API…
Read MoreKey Criteria for Evaluating Attack Surface Management Solutions
Rapid digital growth, cloud adoption, and a sprawling public IP space have created security challenges for organizations and opportunities for attackers.…
Read MoreKey Criteria for Evaluating Governance, Risk, and Compliance (GRC) Solutions
Risk, and risk management, should be a driving force within IT departments. However, for most enterprises, risk management is a tax…
Read MoreManaging Vulnerabilities in a Cloud Native World
This free 1-hour webinar from GigaOm Research brings together experts in Cloud Native Vulnerability Management, featuring analyst Iben Rodriguez and special…
Watch NowSecurity Tools Help Bring Dev and Security Teams Together
Software development teams are increasingly focused on identifying and mitigating any issues as quickly and completely as possible. This relates not…
Read MoreKey Criteria for Evaluating User and Entity Behavior Analytics (UEBA) Solutions
Cybersecurity is a multidisciplinary practice that not only grows in complexity annually but evolves nearly as quickly. A survey of the…
Read MoreGigaOm Radar for Developer Security Tools
As we learned in the associated GigaOm report, “Key Criteria for Evaluating Developer Security Tools,” the most cost-effective method for reducing…
Read MoreGigaOm Radar for User and Entity Behavior Analytics (UEBA)
Report updated 3.4.2022 to include Securonix in the list of vendors. Cybersecurity is a multidisciplinary practice that not only grows in…
Read MoreGigaOm Radar for Deception Technology
Attacker techniques and behaviors are constantly evolving. As cyber security defenses zig, attackers zag. This dynamic creates an environment wherein what…
Read MoreChris Ray
Chris Ray is a veteran of the cyber security domain. He has a collection of experiences ranging from small teams to…
Learn MoreAlan Rodger
Alan Rodger has worked in industry analyst roles for almost 20 years, supporting clients mainly by writing, advising, or speaking on…
Learn MoreGigaOm Radar for Unified Endpoint Management (UEM)
Endpoint management is one of the most significant challenges enterprises face today. The modern workforce is becoming more distributed and demanding…
Read MoreKey Criteria for Evaluating Deception Technology
Attacker techniques and behaviors are constantly improving and evolving. As cyber security defenses zig, attackers zag. This dynamic creates a changed…
Read MoreDefeating Distributed Denial of Service Attacks
It seems like every day the news brings new stories of cyberattacks. Whether ransomware, malware, crippling viruses, or more frequently of…
Read MoreKey Criteria for Evaluating Developer Security Tools
Software needs to be written, built, and deployed with security in mind. This is true for both the application being created…
Read MoreKey Criteria for Evaluating Unified Endpoint Management
Endpoint management is one of the most significant challenges in the enterprise today. An increasingly large percentage of our workforce is…
Read MoreData Storage for Ever Changing Business Needs
Join GigaOm analyst Enrico Signoretti and CTERA CTO Aron Brand in this one-hour live webinar as they explore file storage trends…
Watch NowHigh Performance Application Security Testing – Cloud WAF Security Platforms
This free 1-hour webinar from GigaOm Research features analyst Jake Dolezal and will focus on comparing Web Application Firewall (WAF) security…
Watch Now