Network detection and response (NDR) is an advanced cybersecurity approach that focuses on detecting and responding to threats within a network…
Read MoreResearch
GigaOm Radar for Continuous Vulnerability Management
Vulnerability management is now a cornerstone of cybersecurity frameworks and should be a part of every organization’s cybersecurity plan. This critical…
Read MoreKey Criteria for Evaluating Data Loss Prevention (DLP) Solutions
Data is a precious resource for today’s enterprises, and preventing data loss is of paramount importance. The cost of data loss…
Read MoreStandalone SOAR is Alive and Kicking
Multiple publications and analyst firms have predicted a doomsday scenario for the standalone SOAR following a number of acquisitions in the…
Read MoreIs there a case for Microsoft as your only enterprise security partner?
In recent GigaOm research, we evaluated whether there was a good argument to use a single security partner to protect an…
Read MoreMicrosoft takes Entra to the edge
Identity security must be at the heart of any organization’s security strategy. Our infrastructures have become more disparate, and our users…
Read MoreTop Trends from Infosec Europe
Infosec Europe, this year at London’s Excel arena, is an opportunity for those of us working day to day in the…
Read MoreKey Criteria for Evaluating Continuous Vulnerability Management Solutions
Traditional vulnerability management is an essential part of many cybersecurity programs. It aids in the discovery of hardware and software assets…
Read MoreGigaOm Radar for Distributed Denial of Service (DDoS) Protection
According to the Cybersecurity and Infrastructure Security Agency (CISA), distributed denial of service (DDoS) attacks are a common threat to organizations.…
Read MoreKey Criteria for Evaluating API Security Solutions
Application programming interfaces (APIs) are now central to modern development, but as their use has skyrocketed over the past 15 years…
Read MoreGigaOm Radar for Anti-Phishing
Phishing remains the leading method used by cybercriminals to attempt to breach and infiltrate organizations with malware, credential harvesters, and ransomware.…
Read MoreGigaOm Radar for Security Information and Event Management (SIEM)
The security information and event management (SIEM) solution space is mature and competitive. Most vendors have had well over a decade…
Read More