Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of cybersecurity,
Zero Trust 101: It’s Time to Ditch “Trust but Verify”
Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of cybersecurity,
Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best, but
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many
Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based solutions.
A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are constantly
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up. For
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises that
One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen through
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments as
Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was a