Container security technology is a critical component of modern application security, providing comprehensive protection for containerized applications and infrastructure throughout their…
Read MoreResearch
GigaOm Radar for Ransomware Prevention
Ransomware remains a high-priority threat for all organizations, continuously evolving alongside the growing sophistication of attackers and their tools. Attacks are…
Read MoreNavigating Technological Sovereignty in the Digital Age
Depending on who you speak to, technological sovereignty is either a hot topic, or something that other organizations need to deal…
Read MoreGigaOm Radar for Software Supply Chain Security
Software supply chain attacks have become highly visible due to extensive media coverage such as of the Solarwinds attack in 2020…
Read MoreGigaOm Radar for Cloud Network Security
Cloud network security solutions provide a suite of security services for single- and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreGigaOm Radar for Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based cybersecurity solution that provides continuous, automated security testing capabilities. It enables organizations…
Read MoreGigaOm Key Criteria for Evaluating Cloud Network Security Solutions
Cloud network security solutions provide a suite of security services for single and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreSeth Byrnes
Seth Byrnes has extensive experience in developing strategic roadmaps, implementing robust technology solutions, and leading cross-functional teams to drive operational excellence.
Learn MoreThe Case for Security.txt
In today’s cybersecurity landscape, it’s not just about having robust defenses—it’s also about building trust and partnerships with the wider security…
Read MoreGigaOm Key Criteria for Evaluating Cloud-Native Application Protection Platforms (CNAPPs)
Cloud-native application protection platforms (CNAPPs) are comprehensive security solutions designed to safeguard cloud-native applications and workloads throughout their entire lifecycle. These…
Read MoreDiscovering Disruptions in Tech – With Rajesh Khazanchi of ColorTokens
GigaOm’s Howard Holton is joined by #ColorTokens CEO Rajesh Khazanchi to discuss microsegmentation and security. #BeBreachReady
Watch NowGigaOm Radar for Cloud-Native Application Protection Platforms (CNAPPs)
Cloud-native application protection platforms (CNAPPs) are a blend of technologies that address the complex security challenges of modern cloud-native environments. CNAPP…
Read MoreDiscovering Disruptions in Tech – with Will Gragido of Netwitness at Blackhat
GigaOm’s Howard Holton sits down with Netwitness Chief Product Officer Will Gragido to discuss Data Science and security at Blackhat.
Watch NowDiscovering Disruptions in Tech – With Brian Reed of Proofpoint at Blackhat
GigaOm’s Howard Holton sits down with Brian Reed, Sr. Director of Strategy for Proofpoint at Blackhat to discuss Threat Management and…
Watch NowGigaOm Radar for Security Orchestration, Automation, and Response (SOAR)
Security orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s to provide a set of tools and…
Read MoreGigaOm Radar for Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions shift security analysts’ focus from repetitive tasks to investigating only the most important incidents. These…
Read MoreDiscovering Disruptions in Tech – with Doron Peri of Scribe Security at Blackhat
GigaOm’s Howard Holton sits down with Doron Peri, VP of Product at Scribe Security to discuss software supply chain and other…
Watch NowGigaOm Radar for API Security
Application programming interfaces (APIs) serve as the vital connection between applications, services, and systems. API security solutions are specialized technologies designed…
Read MoreGigaOm Radar for Insider Risk Management
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders. Insiders are people…
Read MoreDiscovering Disruptions in Tech, at Black Hat with Gaurav Kulkarni of Sprocket Security
GigaOm’s Howard Holton sits down with Gaurav Kulkarni of Sprocket Security to discuss security and threat management at Blackhat, aka Hacker…
Watch NowDiscovering Disruptions in Tech at Blackhat with Scott Hogrefe of Netskope
GigaOm’s Howard Holton sits down with Scott Hogrefe of Netskope to discuss security, threat management, and other related topics at Blackhat.
Watch NowDiscovering Disruptions in Tech – At Blackhat with Marshall Hielman of DTEX
Howard Holton is joined by DTEX’s Marshall Hielman at Blackhat to discuss cyber security and other topics from the conference.
Watch NowDiscovering Disruptions in Tech – Semantic Layers with David Jayatillake of Cube
CCO Howard Holton is joined by David Jayatillake of Cube to discuss semantic layers and their importance in the tech industry.
Watch NowThe Impact of GenAI on Data Loss Prevention
Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but…
Read More