As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB) is
Embracing the Future: A Vision for the CASB Market

As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB) is
Passwords are the keys to your digital assets: it’s how we access applications and data, as well as infrastructure and systems. Often
In an era where digital transformation is not just a buzzword but a business imperative, edge orchestration platforms are emerging as a
Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data in
In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure, management,
Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements compared
For a long time, enterprise object storage was positioned for archive and backup workloads—hardly the most exciting task, yet certainly a critical
The old saying, “history doesn’t repeat itself, but it often rhymes,” proves itself time and again with computers. In my recent analysis
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past (you
There’s a legacy connotation attached to SIEM that has led to vendors advertising themselves as some iteration of a next-generation solution. But