Every organization has employees who are buried in username and password combinations for both business and personal use. The average user…
Read MoreResearch
GigaOm Key Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach organizations. Successful phishing attacks lead to the loss of…
Read MoreGigaOm Key Criteria for Evaluating SaaS Security Posture Management (SSPM) Solutions
Software as a service (SaaS) has been a major boon to productivity, enabling business units and users to get exactly the…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Password Management Solutions
Employees everywhere are buried in username and password combinations for both business and personal use. The average user has dozens, if…
Read MoreThe Challenge of Securing User Identities
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in…
Read MoreGigaOm Radar for Identity Threat Detection and Response (ITDR)
Identity is an essential part of any organization’s IT infrastructure, acting as the means to control access to the applications and…
Read MoreEverything Your Parents Told You About Posture Is True! Even For Data Security
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreGigaOm Radar for Data Security Posture Management (DSPM)
Data security posture management (DSPM) solutions provide visibility into where sensitive data is, who has access to it, and how it…
Read MoreGigaOm Key Criteria for Evaluating Identity Threat Detection and Response (ITDR) Solutions
Identity management is an essential part of any organization’s IT infrastructure because it serves as the means to control access to…
Read MoreGigaOm Key Criteria for Evaluating Data Security Posture Management (DSPM) Solutions
Data is core to all organizations and should be treated as an essential asset. As the data landscape continues to evolve,…
Read MoreThe Time is Right to Review Your Enterprise Firewalls
Firewalls, we all have one. It’s a well-established market, full of vendors with mature stacks of technology. Firewalls do a number…
Read MoreDNS Security: The Forgotten Hero of Your Cybersecurity Strategy
Cybersecurity continues to dominate business IT discussions in response to constantly evolving threats from ever more organized and professional adversaries. The…
Read More