Latest Research
Making Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreMaking Sense of Cybersecurity – Part 1: Seeing Through Complexity
At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreGigaOm Key Criteria for Evaluating Enterprise Process Automation (EPA) Solutions
Intelligent automation and hyperautomation have become technology buzzwords over the last few years. They represent the next evolutionary step following previous…
Read MoreGigaOm Key Criteria for Evaluating Network as a Service Solutions
Network as a service (NaaS) is a cloud-based networking model that allows organizations to manage and scale their network infrastructure through…
Read MoreGigaOm Key Criteria for Evaluating Cloud Workload Security (CWS) Solutions
Cloud workload security (CWS) is a critical component of modern cybersecurity strategies, focusing on protecting the dynamic and ever-expanding workloads in…
Read MoreGigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions
The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read More