Application development architecture has been changing to accommodate new platforms, processes, and application needs. Increasingly, applications are collections of APIs, both…
Read MoreResearch
CxO Decision Brief: The Value of Secure Endpoint Management Automation
This GigaOm CxO Decision Brief was commissioned by Syxsense. One of the biggest IT investments any organization makes is in its…
Read MoreWhat You Need to Know About API Security (The Suite Spot)
Paul Lewis, Howard Holton, and Carlos Vargas discuss API Security.
Watch NowGigaOm Key Criteria for Evaluating Enterprise Firewall Solutions
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreGigaOm Key Criteria for Evaluating Deception Technology Solutions
Attacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreGigaOm Radar for Domain Name System (DNS) Security
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of communications and the means by which…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security (AAS) Solutions
Modern applications are composed of the application itself and the application programming interfaces (APIs) that represent programmatic access to application subsystems.…
Read MoreCxO Decision Brief: The Imperative of Mobile Application Security Platforms
Commissioned by Zimperium In today’s digital landscape, where mobile applications are vital for business operations, the importance of mobile application security…
Read MoreGigaOm Radar for Attack Surface Management (ASM)
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public internet protocol (IP) space leave organizations…
Read MoreGigaOm Key Criteria for Evaluating DNS Security Solutions
The domain name system (DNS) is fundamental to every modern organization. It’s the backbone of computer network communications and the way…
Read MoreHow to Stop Leaks of Information (The Suite Spot)
Paul Lewis, Howard Holton, and Carlos Vargas discuss how to stop leaks of information.
Watch NowGigaOm Key Criteria for Evaluating Attack Surface Management (ASM) Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read More