CTO Howard Holton, and VP Engagement Jon Collins are joined by Production Manager Johnny Baltisberger to discuss the recent Windows Outage…
Watch NowResearch
GigaOm Key Criteria for Evaluating Continuous Vulnerability Management (CVM) Solutions
A decade ago, vulnerability management relied primarily on network-based scanning, which used common TCP and UDP ports to gather data. That…
Read MoreGigaOm Radar for Network Detection and Response (NDR)
Network detection and response (NDR) solutions represent a critical evolution in cybersecurity. Designed to address the increasingly sophisticated and varied nature…
Read MoreGigaOm Key Criteria for Evaluating Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under one roof. Initially, SIEM solutions supported early detection…
Read MoreGigaOm Radar for Zero-Trust Network Access (ZTNA)
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreDiscovering Disruptions in Tech – Is Cybersecurity Broken?
COO Howard Holton is joined by Shlomo Kramer of Cato networks to discuss the state of cybersecurity, and it’s ramifications on…
Watch NowGigaOm Radar for Enterprise Password Management
Every organization has employees who are buried in username and password combinations for both business and personal use. The average user…
Read MorePutting It All Together: Getting Started with Your Zero Trust Journey
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices,…
Read MoreGovernance and Compliance: Aligning Zero Trust with Business Requirements
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration…
Read MoreAutomation and Orchestration: The Backbone of Zero Trust
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of…
Read MoreGigaOm Key Criteria for Evaluating Security Policy-as-Code Solutions
In the ever-evolving landscape of information technology, the ability to effectively manage and enforce security policies has become paramount. Policy-as-code solutions…
Read MoreGigaOm Key Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach organizations. Successful phishing attacks lead to the loss of…
Read MoreGigaOm Key Criteria for Evaluating Cloud Access Security Broker (CASB) Solutions
A cloud access security broker (CASB) is a technology solution that acts as an intermediary between users and cloud service providers,…
Read MoreMonitoring and Analytics: The Eyes and Ears of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and…
Read MoreRedefining Cybersecurity: Leveraging AI for Proactive Defense
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu…
Read MoreSecuring APIs: The Cornerstone of Zero Trust Application Security
Welcome to the latest installment of our zero trust blog series! In our previous post, we explored the importance of application…
Read MoreGigaOm Key Criteria for Evaluating SaaS Security Posture Management (SSPM) Solutions
Software as a service (SaaS) has been a major boon to productivity, enabling business units and users to get exactly the…
Read MoreSecuring Applications: Zero Trust for Cloud and On-Premises Environments
Welcome back to our zero trust blog series! In our previous post, we discussed the importance of device security and explored…
Read MoreGigaOm Radar for Operational Technology (OT) Security
Operational technology (OT) security solutions are crucial for organizations aiming to fortify their defenses and safeguard their assets from an array…
Read MoreDiscovering Disruptions in Technology with Chris Heard of Olive
COO Howard Holton meets with Olive CEO Chris Heard to discuss how platforms can enable democratization.
Watch NowDiscovering Disruptions in Tech – Cradlepoint
COO Howard Holton meets with Anubhav Arora who leads the security engineering teams at Cradlepoint to discuss Zero-Trust security.
Watch NowGigaOm Key Criteria for Evaluating Zero-Trust Network Access (ZTNA) Solutions
Secure remote access provides numerous benefits to organizations, making it an essential component of their business operations. One of the primary…
Read MoreSecuring Endpoints: Zero Trust for Devices and IoT
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the importance of network…
Read MoreMicrosegmentation: Implementing Zero Trust at the Network Level
Welcome back to our zero trust blog series! In our previous post, we explored the importance of data security and identity…
Read More