A technology leader with 20+ years of experience developing solutions across many industries and disciplines such as infrastructure, virtualization, automation/orchestration, security,…
Learn MoreResearch
Richard Walters
A seasoned CTO with more than 25 years experience in cybersecurity, working across products (14 years building SaaS solutions) and services.
Learn MoreAaron Lloyd
A security leader with a proven track record of building and leading security capabilities across multiple, highly regulated industries.
Learn MoreChester Conforte
Chester Conforte is an experienced technology strategist and analyst with over 15 years in the enterprise technology industry consulting for CIO’s,…
Learn MoreRob Teel
Chief Technology Officer, State of Oklahoma, advises state leaders on IT strategy, innovation and digital infrastructure for a 22B annual budget.…
Learn MoreLuciano Patrao
Solution Architect and technology analyst with 15+ years’ experience in infrastructure, virtualization, disaster recovery, and data protection. Designed and advised on…
Learn MoreCEO Speaks with Rehan Jalil of Securiti
GigaOm’s Ben Book sits down to discuss tech leadership and the CEO journey with Securiti CEO Rehan Jalil.
Watch NowWhen Patching Isn’t Enough
Executive Briefing What Happened: A stealthy, persistent backdoor was discovered in over 16,000 Fortinet firewalls. This wasn’t a new vulnerability –…
Read MoreGigaOm Radar for Data Security Posture Management (DSPM)
Data is core to all organizations, serving as a critical business asset that drives decision making. The importance of data has…
Read MoreGigaOm Key Criteria for Evaluating Deception Technology Solutions
Attacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreGigaOm Radar for Deception Technology
Cybersecurity technology, and more specifically deception technology, has become increasingly important in today’s digital landscape. Deception solutions, including baits, lures, and…
Read MoreGigaOm Radar for Identity and Access Management
Identity and access management (IAM) technology ensures that only authorized users have access to specific resources within an organization. IAM solutions…
Read MoreGigaOm Radar for Enterprise Firewalls
Firewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read MoreGigaOm Radar for Attack Surface Management
Attack Surface Management (ASM) has emerged as a critical security capability that provides organizations with continuous visibility into their expanding digital…
Read MoreGigaOm Solution Brief: Ericsson
This GigaOm Solution Brief was commissioned by Ericsson Enterprise Wireless Solutions (formerly Cradlepoint) and is based on the GigaOm Radar Report…
Read MoreGigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM) Solutions
Cloud infrastructure entitlement management (CIEM) solutions are specialized security tools designed to address the complex challenges of managing identities, access rights,…
Read MoreGigaOm Key Criteria for Evaluating Attack Surface Management (ASM) Solutions
The difficulties and challenges presented by rapid digital growth, cloud adoption, and the sprawling public IP space leave organizations unable to…
Read MoreGigaOm Key Criteria for Evaluating Cloud Infrastructure Entitlement Management (CIEM) Solutions
Cloud Infrastructure Entitlement Management (CIEM) is an emerging cybersecurity technology designed to address the complex challenges of managing identities, access rights,…
Read MoreGigaOm Radar for Unified Endpoint Management (UEM) Solutions
Endpoint management is one of the most significant challenges in enterprises today. This is driven in part by the increasingly large…
Read MoreGigaOm Radar for Secure Access Service Edge (SASE)
Secure access service edge (SASE) is a security framework that converges network security functions with software-defined wide-area networking (SD-WAN) capabilities to…
Read MoreGigaOm Key Criteria for Evaluating Insider Risk Management Solutions
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders—those who have authorized…
Read MoreGigaOm Key Criteria for Evaluating Application and API Security Solutions
Application and API security technology encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs…
Read MoreGigaOm Key Criteria for Evaluating Data Security Platform (DSP) Solutions
Poorly managed and inadequately secured data leaves organizations at risk of a data breach and increases the costs of storage and…
Read MoreGigaOm Radar for Cloud Workload Security
Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major…
Read More