The cloud-first strategy is no longer in its infancy. This wave of change has impacted and continues to disrupt the entire…
Read MoreResearch
Springing the Trap: Snagging Rogue Insiders with Deceptive Tactics
Insider threats pose a serious cybersecurity challenge for organizations across all industries. When trusted employees, contractors, or partners abuse their privileges…
Read MoreThe Evolution of Application and API Security (AAS)
AAS Today Application and API security (AAS) has been around as a unified security toolset for several years now, and it…
Read MoreGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)
Cloud infrastructure and endpoint management (CIEM) solutions enable organizations to efficiently manage and secure their cloud infrastructure as well as the…
Read MoreDNS Security: The Forgotten Hero of Your Cybersecurity Strategy
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The…
Read MoreBest Practices for Implementing an ASM Solution
In the ever-changing realm of digital technology, organizations are witnessing an unprecedented expansion of their digital footprints. This expansion is not…
Read MoreGigaOm Radar for Enterprise Firewalls
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreSASE: Today’s Landscape and Tomorrow’s Horizons
Secure access service edge (SASE) is a transformative cybersecurity concept that converges network security functions with wide-area networking capabilities to match…
Read MoreThe Good, The Bad, & The Techy: Insider Risk Management
VP Engagement Jon Collins is joined by Marshall Heilman, CEO of DTEX Systems to discuss risk management and assessment.
Watch NowThe Good, The Bad, & The Techy: Is There Life After Incidents?
COO Howard Holton and VP Engagement Jon Collins meet with Nora Jones, Senior Director of Product at Pager Duty, to discuss…
Watch NowGigaOm Radar for Deception Technology
Cybersecurity technology, and more specifically deception technology, has become increasingly important in today’s digital landscape. Deception solutions, including baits, lures, and…
Read MoreGigaOm Key Criteria for Evaluating Cloud Infrastructure Entitlement Management (CIEM) Solutions
In the on-premises world, organizations can achieve total control over their information assets. Their business objectives are served by technological tools…
Read More