According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a common threat to organizations.…
Read MoreResearch
Key Criteria for Evaluating API Security Solutions
Application programming interfaces (APIs) are now central to modern development, but as their use has skyrocketed over the past 15 years…
Read MoreGigaOm Radar for Anti-Phishing
Phishing remains the leading method used by cybercriminals to attempt to breach and infiltrate organizations with malware, credential harvesters, and ransomware.…
Read MoreGigaOm Radar for Security Information and Event Management (SIEM)
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read MoreKey Criteria for Evaluating Cloud Security Posture Management (CSPM) Solutions
Cloud security posture management (CSPM) offerings are security solutions designed specifically for cloud environments. They employ the multitude of application programming…
Read MoreThe Good, The Bad, & The Techy: RSA Security
Recently, GigaOm CTO Howard Holton attended the RSA Security show. This week he and VP of Research, Jon Collins discuss not…
Watch NowKey Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach and infiltrate organizations with malware, credential harvesters, and ransomware.…
Read MoreGigabrief: The Business Case for Extended Detection and Response (XDR)
As the security landscape evolves, XDR solutions help organizations deal with increased threats and attacks
Read MoreThe Fundamentals of Buying a Security Solution Today
Cybersecurity incidents aren’t something that happens to other people. Organizations today accept that it’s not about whether a breach will occur…
Read MoreKey Criteria for Evaluating Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under one roof. Initially, SIEM solutions supported early detection…
Read MoreMOVEit Transfer hack is right on trend
The information in this post is based on the details of the attack as known on the 7th June 2023. The…
Read MoreThemes and Trends at RSA 2023
With RSA 2023 a few weeks ago, now is a good time to think about what I saw, the things I…
Read MoreGigaOm Research Bulletin #003
Welcome to GigaOm’s research bulletin for May 2023 Hi and welcome back. We’re delighted to share our July-September syndicated research schedule,…
Read MoreKey Criteria for Evaluating Secure Service Access (SSA) Solutions
Secure service access (SSA) represents a significant shift in the way organizations consume network security, enabling them to replace multiple security…
Read MoreStrengthening the Human Firewall: Security Awareness Training
Why do we need cybersecurity awareness training? To me, having put together our Cybersecurity Radar Report, the answer is simple: given…
Read MoreGigaOm Radar for Enterprise Password Management
Every organization has employees who are buried in username and password combinations, both business and personal. Humans are not good at…
Read MoreGigaOm Radar for Security Policy as Code
In the early days of security, organizations did not have security policies in place. Instead, they had procedures and standards—books full…
Read MoreGigaOm Radar for Secure Service Access (SSA)
Secure service access (SSA) represents a significant shift in how organizations consume network security. Replacing multiple point products with a single…
Read MoreHow Would a Distributed SIEM Look?
SIEMs have been the main workhorse for security operations centers, constantly scaled up throughout the years to accommodate the increased volume…
Read MoreGigaOm Radar for Operational Technology (OT) Security
The unification of operational technology (OT) and information technology (IT) brings a range of benefits to sophisticated technology systems in industries…
Read MoreKey Criteria for Evaluating Distributed Denial of Service (DDoS) Protection Solutions
According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a growing threat to organizations.…
Read MoreThe Evolution of E-Signature Functionality & Market Trends
Key Criteria for Evaluating Application Security Testing Solutions
Testing has always been seen as a cost center. While everyone agrees that, in general, testing improves product quality and security…
Read More