Identity and access management (IAM) technology ensures that only authorized users have access to specific resources within an organization. IAM solutions…
Read MoreResearch
GigaOm Radar for Enterprise Firewalls
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreGigaOm Radar for Attack Surface Management
Attack Surface Management (ASM) has emerged as a critical security capability that provides organizations with continuous visibility into their expanding digital…
Read MoreGigaOm Solution Brief: Ericsson
This GigaOm Solution Brief was commissioned by Ericsson Enterprise Wireless Solutions (formerly Cradlepoint) and is based on the GigaOm Radar Report…
Read MoreGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM) Solutions
Cloud infrastructure entitlement management (CIEM) solutions are specialized security tools designed to address the complex challenges of managing identities, access rights,…
Read MoreGigaOm Key Criteria for Evaluating Attack Surface Management (ASM) Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreGigaOm Key Criteria for Evaluating Cloud Infrastructure Entitlement Management (CIEM) Solutions
Cloud Infrastructure Entitlement Management (CIEM) is an emerging cybersecurity technology designed to address the complex challenges of managing identities, access rights,…
Read MoreGigaOm Radar for Unified Endpoint Management (UEM) Solutions
Endpoint management is one of the most significant challenges in enterprises today. This is driven in part by the increasingly large…
Read MoreGigaOm Radar for Secure Access Service Edge (SASE)
Secure access service edge (SASE) is a security framework that converges network security functions with software-defined wide-area networking (SD-WAN) capabilities to…
Read MoreGigaOm Key Criteria for Evaluating Insider Risk Management Solutions
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders—those who have authorized…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security Solutions
Application and API security technology encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs…
Read MoreGigaOm Key Criteria for Evaluating Data Security Platform (DSP) Solutions
Poorly managed and inadequately secured data leaves organizations at risk of a data breach and increases the costs of storage and…
Read MoreGigaOm Radar for Cloud Workload Security
Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major…
Read MoreMaking Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreMaking Sense of Cybersecurity – Part 1: Seeing Through Complexity
At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreGigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions
The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read MoreGigaOm Key Criteria for Evaluating Container Security Solutions
Container security solutions are comprehensive tools designed to protect containerized applications and their underlying infrastructure throughout the software development lifecycle, from…
Read MoreStan Wisseman
Stan Wisseman is a seasoned cybersecurity professional with experience spanning roles like Security Engineer, CISO, and Chief Strategist. He’s passionate about…
Learn MoreGigaOm Key Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read MoreGigaOm Key Criteria for Evaluating Secure Access Service Edge (SASE) Solutions
Secure access service edge (SASE) is a cloud-based architecture converging networking and security functions into a unified, scalable solution to address…
Read MoreGigaOm Key Criteria for Evaluating Ransomware Prevention Solutions
Ransomware continues to be a high-priority threat for all organizations, and as with all cybersecurity challenges, the threat continues to evolve…
Read MoreGigaOm Key Criteria for Evaluating Software Supply Chain Security (SSCS) Solutions
Software supply chain security (SSCS) solutions are a blend of specialized technologies and tools designed to protect the entire software development…
Read MoreGigaOm Key Criteria for Evaluating Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based solution that provides on-demand security testing to organizations. It offers continuous vulnerability…
Read MoreWhere’s Security Going in 2025?
Few areas of technology are moving as fast as security, so what gives and how is it going to evolve in…
Read More