The latest SEC ruling on cybersecurity will almost certainly have an impact on risk management and post-incident disclosure, and CISOs will…
Read MoreResearch
GigaOm Radar for Microsegmentation
Microsegmentation solutions define and enforce per-entity communications policies. In this context, an entity can be any information technology (IT) or operational…
Read MoreGigaOm Key Criteria for Evaluating Extended Detection and Response (XDR) Solutions
Enterprise cybersecurity is composed of multiple security solutions from various vendors combined with a security information and event management (SIEM) and/or…
Read MoreGigaOm Key Criteria for Evaluating Microsegmentation Solutions
Microsegmentation solutions isolate single entities on networks by restricting inbound traffic, minimizing a malicious actor’s potential for lateral movement. A more…
Read MoreThe Time is Right to Review Your Enterprise Firewalls
Firewalls, we all have one. It’s a well-established market, full of vendors with mature stacks of technology. Firewalls do a number…
Read MoreCIEM: Bridging the Gap Between IAM and Cloud Security
The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire…
Read MoreSpringing the Trap: Snagging Rogue Insiders with Deceptive Tactics
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges…
Read MoreThe Evolution of Application and API Security (AAS)
AAS Today Application and API security (AAS) has been around as a unified security toolset for several years now, and it…
Read MoreGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)
Cloud infrastructure and endpoint management (CIEM) solutions enable organizations to efficiently manage and secure their cloud infrastructure as well as the…
Read MoreDNS Security: The Forgotten Hero of Your Cybersecurity Strategy
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The…
Read MoreBest Practices for Implementing an ASM Solution
In the ever-changing realm of digital technology, organizations are witnessing an unprecedented expansion of their digital footprints. This expansion is not…
Read MoreGigaOm Radar for Enterprise Firewalls
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read More