On this special Halloween episode, Howard Holton and Jon Collins tell each other scary stories from their tech past. Enter for tales of corrupted servers, ransomed software, and maybe a haunted hard drive or two.
Related Research
Everything Your Parents Told You About Posture Is True! Even For Data Security
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreGigaOm Radar for Data Security Posture Management (DSPM)
Data security posture management (DSPM) solutions provide visibility into where sensitive data is, who has access to it, and how it…
Read MoreGigaOm Radar for Network Observability
Network observability is a category of solutions that go beyond device-centric network monitoring to provide truly relevant end-to-end visibility and intelligence…
Read MoreSSE vs. SASE: Which One is Right for Your Business?
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises…
Read MoreGigaOm Key Criteria for Evaluating Full-Stack Edge Deployment Solutions
Full-stack edge deployments are cloud-managed and cloud-connected software-defined hyperconverged solutions that provide all the tools for running applications at customers’ preferred…
Read MoreSave Money and Increase Performance on the Cloud
One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen…
Read More