Phishing is the primary method for breaching businesses. According to a 2018 Verizon Data Breach report, 96% of all attacks begin…
Read MoreResearch
Zimperium
We covered Zimperium in our December 2018 Landscape Report, and they continue to stand out in their approach and philosophy. Zimperium…
Read MoreSelecting and Adopting a Security-Standards Framework
Many organizations find themselves having to address the information security demands of their clients in addition to government regulators. Losing bids…
Read MoreZero Trust Cloud Security Provider Aporeto: Product Profile and Evaluation
Microservices approaches such as Kubernetes are changing the way people think about applications, bringing the dual benefits of massive scalability and…
Read MoreAporeto Product Evaluation Test Lab Setup and Instructions
This report documents the GigaOm Field Test Lab Setup instructions to evaluate Aporeto’s zero trust cloud security solution. This report corresponds…
Read MorePublic Key Infrastructure
The role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on…
Read MoreFinancial Services: Document Productivity and the Digital Experience
Documents have always been part of the financial services industry. The ability to represent agreements or processes with documents is key…
Read MoreVoices in DevOps – Episode 13: A Conversation with Gareth Rushgrove of Snyk
Jon Collins speaks with Gareth Rushgrove on scaling up DevOps in a security company. Jon Collins speaks with Gareth Rushgrove on…
Listen NowDevSecOps
To ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need…
Read MoreDeception Technology
Deception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and…
Read MoreBug Bounty and Penetration Testing
Bug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to…
Read MoreKey Criteria for Evaluating Enterprise HCI
IT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the…
Read More