Secure access service edge (SASE) is a transformative cybersecurity concept that converges network security functions with wide-area networking capabilities to match…
Read MoreResearch
The Good, The Bad, & The Techy: Insider Risk Management
VP Engagement Jon Collins is joined by Marshall Heilman, CEO of DTEX Systems to discuss risk management and assessment.
Watch NowThe Good, The Bad, & The Techy: Is There Life After Incidents?
COO Howard Holton and VP Engagement Jon Collins meet with Nora Jones, Senior Director of Product at Pager Duty, to discuss…
Watch NowGigaOm Radar for Deception Technology
Cybersecurity technology, and more specifically deception technology, has become increasingly important in today’s digital landscape. Deception solutions, including baits, lures, and…
Read MoreGigaOm Key Criteria for Evaluating Cloud Infrastructure Entitlement Management (CIEM) Solutions
In the on-premises world, organizations can achieve total control over their information assets. Their business objectives are served by technological tools…
Read MoreGigaOm Radar for Application and API Security (AAS)
Application development architecture has been changing to accommodate new platforms, processes, and application needs. Increasingly, applications are collections of APIs, both…
Read MoreCxO Decision Brief: The Value of Secure Endpoint Management Automation
This GigaOm CxO Decision Brief was commissioned by Syxsense. One of the biggest IT investments any organization makes is in its…
Read MoreWhat You Need to Know About API Security (The Suite Spot)
Paul Lewis, Howard Holton, and Carlos Vargas discuss API Security.
Watch NowDr. Shane C. Archiquette
Dr Shane C. Archiquette is dedicated to driving technological innovation and advanced AI to provide sustainable, outcome focused solutions for global…
Learn MoreGigaOm Key Criteria for Evaluating Enterprise Firewall Solutions
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreGigaOm Key Criteria for Evaluating Deception Technology Solutions
Attacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreGigaOm Radar for Domain Name System (DNS) Security
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of communications and the means by which…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security (AAS) Solutions
Modern applications are composed of the application itself and the application programming interfaces (APIs) that represent programmatic access to application subsystems.…
Read MoreCxO Decision Brief: The Imperative of Mobile Application Security Platforms
Commissioned by Zimperium In today’s digital landscape, where mobile applications are vital for business operations, the importance of mobile application security…
Read MoreGigaOm Radar for Attack Surface Management (ASM)
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public internet protocol (IP) space leave organizations…
Read MoreGigaOm Key Criteria for Evaluating DNS Security Solutions
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of computer network communications and the way…
Read MoreHow to Stop Leaks of Information (The Suite Spot)
Paul Lewis, Howard Holton, and Carlos Vargas discuss how to stop leaks of information.
Watch NowGigaOm Key Criteria for Evaluating Attack Surface Management (ASM) Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreGigaOm Radar for Secure Access Service Edge (SASE)
Secure access service edge (SASE) is a security framework that converges network security functions with wide area networking (WAN) capabilities to…
Read MoreCharting A Course Through Cloud Workload Security (CWS): An Enterprise Blueprint
The landscape of cloud workload security (CWS) is rapidly evolving, offering new challenges and opportunities for businesses of all sizes. In…
Read MoreThe Evolution of Endpoint Management
Unified endpoint management (UEM) is neither a new term nor a new technology. Rather, it’s a bundling of existing technologies into…
Read More“But Aren’t CDNs Boring?” No, Not at All.
Content delivery networks (CDNs) have been around for decades, so they may not generate the interest and excitement of newer technology.…
Read MoreGigaOm Key Criteria for Evaluating Secure Access Service Edge (SASE) Solutions
Secure access service edge (SASE) is a security framework that converges network security functions with wide-area networking (WAN) capabilities to support…
Read MoreGigaOm Radar for Unified Endpoint Management (UEM)
Endpoint management is a significant challenge for organizations. Providing employees access to the data and services they require to do their…
Read More