Autonomous security operations center (SOC) solutions shift security analysts’ focus from repetitive tasks to investigating only the most important incidents. These…
Read MoreResearch
Discovering Disruptions in Tech – with Doron Peri of Scribe Security at Blackhat
GigaOm’s Howard Holton sits down with Doron Peri, VP of Product at Scribe Security to discuss software supply chain and other…
Watch NowGigaOm Radar for API Security
Application programming interfaces (APIs) serve as the vital connection between applications, services, and systems. API security solutions are specialized technologies designed…
Read MoreGigaOm Radar for Insider Risk Management
Insider risk management is the process of identifying, assessing, and mitigating the potential threats posed by organizational insiders. Insiders are people…
Read MoreDiscovering Disruptions in Tech, at Black Hat with Gaurav Kulkarni of Sprocket Security
GigaOm’s Howard Holton sits down with Gaurav Kulkarni of Sprocket Security to discuss security and threat management at Blackhat, aka Hacker…
Watch NowDiscovering Disruptions in Tech at Blackhat with Scott Hogrefe of Netskope
GigaOm’s Howard Holton sits down with Scott Hogrefe of Netskope to discuss security, threat management, and other related topics at Blackhat.
Watch NowDiscovering Disruptions in Tech – At Blackhat with Marshall Hielman of DTEX
Howard Holton is joined by DTEX’s Marshall Hielman at Blackhat to discuss cyber security and other topics from the conference.
Watch NowDiscovering Disruptions in Tech – Semantic Layers with David Jayatillake of Cube
CCO Howard Holton is joined by David Jayatillake of Cube to discuss semantic layers and their importance in the tech industry.
Watch NowThe Impact of GenAI on Data Loss Prevention
Data is essential for any organization. This isn’t a new concept, and it’s not one that should be a surprise, but…
Read MoreIdentity, Endpoint, and Network Security Walk into a Bar
With a macrotrend/backdrop of platformization and convergence, the industry is exploring places where identity security, endpoint security, and network security naturally…
Read More“Gone Phishing”—Every Cyberattacker’s Favorite Phrase
Phishing—how old hat is that as a topic? Isn’t it solved for most of us by now? Can’t we speak about…
Read MoreSecurity Policy as Code: An Architect’s Perspective on the Evolving Landscape
I have always been intrigued by how security marries automation in infrastructure. Defining and managing security policies as code in what…
Read More