This report documents the GigaOm Field Test Lab Setup instructions to evaluate Aporeto’s zero trust cloud security solution. This report corresponds…
Read MoreResearch
Public Key Infrastructure
The role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on…
Read MoreFinancial Services: Document Productivity and the Digital Experience
Documents have always been part of the financial services industry. The ability to represent agreements or processes with documents is key…
Read MoreVoices in DevOps – Episode 13: A Conversation with Gareth Rushgrove of Snyk
Jon Collins speaks with Gareth Rushgrove on scaling up DevOps in a security company. Jon Collins speaks with Gareth Rushgrove on…
Listen NowDevSecOps
To ensure data and services are protected against attack, DevOps is evolving to incorporate cybersecurity practices across the lifecycle. Organizations need…
Read MoreDeception Technology
Deception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and…
Read MoreBug Bounty and Penetration Testing
Bug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to…
Read MoreKey Criteria for Evaluating Enterprise HCI
IT organizations of all sizes are facing several infrastructure challenges. On one hand, they repeatedly receive pressing requirements coming from the…
Read MoreVoices in DevOps – Episode 10: A Conversation with Liz Rice of Aqua Security
Jon Collins speaks with Liz Rice on the use of DevOps in building Security Platforms. Jon Collins speaks with Liz Rice…
Listen NowLeveling Up DevOps Security
Cybersecurity and innovation are not the most comfortable of bedfellows. While every CIO will say security is a top priority, innovation…
Read MoreRight Size Security – Episode 5: Bug Bounties
In this episode of Right Size Security, Simon and Steve discuss bug bounties, penetration testing, some of the tools used to…
Listen NowVoices in Cloud – Episode 10: A Conversation with Wendy Nather of CISCO
In this episode of Voices in Cloud, David speaks with Wendy Nather of CISCO about her more than 30 years in…
Listen Now