It is common in today’s workforce to find multiple generations working alongside each other. While to some extent this has always…
Read MoreResearch
Putting It All Together: Getting Started with Your Zero Trust Journey
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices,…
Read MoreGovernance and Compliance: Aligning Zero Trust with Business Requirements
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration…
Read MoreAutomation and Orchestration: The Backbone of Zero Trust
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of…
Read MoreMonitoring and Analytics: The Eyes and Ears of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and…
Read MoreRedefining Cybersecurity: Leveraging AI for Proactive Defense
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu…
Read MoreSecuring APIs: The Cornerstone of Zero Trust Application Security
Welcome to the latest installment of our zero trust blog series! In our previous post, we explored the importance of application…
Read MoreSecuring Applications: Zero Trust for Cloud and On-Premises Environments
Welcome back to our zero trust blog series! In our previous post, we discussed the importance of device security and explored…
Read MoreSecuring Endpoints: Zero Trust for Devices and IoT
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the importance of network…
Read MoreMicrosegmentation: Implementing Zero Trust at the Network Level
Welcome back to our zero trust blog series! In our previous post, we explored the importance of data security and identity…
Read MoreCustomer-Centric Marketing for Technology Vendors
In today’s fast-paced, highly competitive market, technology vendors often struggle to connect with their customers on a meaningful level. Traditional marketing…
Read MoreSecuring Identities: The Foundation of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into data security, exploring…
Read MoreProtecting Your Crown Jewels
Welcome back to our zero trust blog series! In the previous posts, we introduced the concept of zero trust and explored…
Read MoreBuilding Blocks of Zero Trust: A Comprehensive Guide
In our previous post, we introduced the concept of zero trust and explored why it’s becoming an essential approach to cybersecurity…
Read MoreReflections on Snowflake Summit 2024
This past week, I had the opportunity to attend Snowflake Summit 2024 in San Francisco. As an analyst, I was treated…
Read MoreZero Trust 101: It’s Time to Ditch “Trust but Verify”
Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of…
Read MoreNear, Far, Wherever Your CPUs Are
Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best,…
Read MoreThe Challenge of Securing User Identities
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in…
Read MoreCould Network Modeling Replace Observability?
Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based…
Read MoreOn Questionnaires and Briefings: Explaining the GigaOm Policy Change
A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are…
Read MoreEverything Your Parents Told You About Posture Is True! Even For Data Security
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreSSE vs. SASE: Which One is Right for Your Business?
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises…
Read MoreSave Money and Increase Performance on the Cloud
One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen…
Read MoreThere’s Nothing Micro About Microsegmentation
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments…
Read More