The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire…
Read MoreResearch
Springing the Trap: Snagging Rogue Insiders with Deceptive Tactics
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges…
Read MoreThe Evolution of Application and API Security (AAS)
AAS Today Application and API security (AAS) has been around as a unified security toolset for several years now, and it…
Read MoreGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)
Cloud infrastructure and endpoint management (CIEM) solutions enable organizations to efficiently manage and secure their cloud infrastructure as well as the…
Read MoreDNS Security: The Forgotten Hero of Your Cybersecurity Strategy
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The…
Read MoreBest Practices for Implementing an ASM Solution
In the ever-changing realm of digital technology, organizations are witnessing an unprecedented expansion of their digital footprints. This expansion is not…
Read MoreGigaOm Radar for Enterprise Firewalls
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreSASE: Today’s Landscape and Tomorrow’s Horizons
Secure access service edge (SASE) is a transformative cybersecurity concept that converges network security functions with wide-area networking capabilities to match…
Read MoreThe Good, The Bad, & The Techy: Insider Risk Management
VP Engagement Jon Collins is joined by Marshall Heilman, CEO of DTEX Systems to discuss risk management and assessment.
Watch NowThe Good, The Bad, & The Techy: Is There Life After Incidents?
COO Howard Holton and VP Engagement Jon Collins meet with Nora Jones, Senior Director of Product at Pager Duty, to discuss…
Watch NowGigaOm Radar for Deception Technology
Cybersecurity technology, and more specifically deception technology, has become increasingly important in today’s digital landscape. Deception solutions, including baits, lures, and…
Read MoreGigaOm Key Criteria for Evaluating Cloud Infrastructure Entitlement Management (CIEM) Solutions
In the on-premises world, organizations can achieve total control over their information assets. Their business objectives are served by technological tools…
Read MoreGigaOm Radar for Application and API Security (AAS)
Application development architecture has been changing to accommodate new platforms, processes, and application needs. Increasingly, applications are collections of APIs, both…
Read MoreCxO Decision Brief: The Value of Secure Endpoint Management Automation
This GigaOm CxO Decision Brief was commissioned by Syxsense. One of the biggest IT investments any organization makes is in its…
Read MoreWhat You Need to Know About API Security (The Suite Spot)
Paul Lewis, Howard Holton, and Carlos Vargas discuss API Security.
Watch NowDr. Shane C. Archiquette
Dr Shane C. Archiquette is dedicated to driving technological innovation and advanced AI to provide sustainable, outcome focused solutions for global…
Learn MoreGigaOm Key Criteria for Evaluating Enterprise Firewall Solutions
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreGigaOm Key Criteria for Evaluating Deception Technology Solutions
Attacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreGigaOm Radar for Domain Name System (DNS) Security
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of communications and the means by which…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security (AAS) Solutions
Modern applications are composed of the application itself and the application programming interfaces (APIs) that represent programmatic access to application subsystems.…
Read MoreCxO Decision Brief: The Imperative of Mobile Application Security Platforms
Commissioned by Zimperium In today’s digital landscape, where mobile applications are vital for business operations, the importance of mobile application security…
Read MoreGigaOm Radar for Attack Surface Management (ASM)
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public internet protocol (IP) space leave organizations…
Read MoreGigaOm Key Criteria for Evaluating DNS Security Solutions
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of computer network communications and the way…
Read MoreHow to Stop Leaks of Information (The Suite Spot)
Paul Lewis, Howard Holton, and Carlos Vargas discuss how to stop leaks of information.
Watch Now