Cloud security posture management (CSPM) offerings are security solutions designed specifically for cloud environments. They employ the multitude of application programming…
Read MoreResearch
The Good, The Bad, & The Techy: RSA Security
Recently, GigaOm CTO Howard Holton attended the RSA Security show. This week he and VP of Research, Jon Collins discuss not…
Watch NowKey Criteria for Evaluating Anti-Phishing Solutions
Phishing remains the leading method used by cybercriminals to attempt to breach and infiltrate organizations with malware, credential harvesters, and ransomware.…
Read MoreGigabrief: The Business Case for Extended Detection and Response (XDR)
As the security landscape evolves, XDR solutions help organizations deal with increased threats and attacks
Read MoreThe Fundamentals of Buying a Security Solution Today
Cybersecurity incidents aren’t something that happens to other people. Organizations today accept that it’s not about whether a breach will occur…
Read MoreKey Criteria for Evaluating Security Information and Event Management (SIEM) Solutions
Security information and event management (SIEM) solutions consolidate multiple security data streams under one roof. Initially, SIEM solutions supported early detection…
Read MoreMOVEit Transfer hack is right on trend
The information in this post is based on the details of the attack as known on the 7th June 2023. The…
Read MoreThemes and Trends at RSA 2023
With RSA 2023 a few weeks ago, now is a good time to think about what I saw, the things I…
Read MoreGigaOm Research Bulletin #003
Welcome to GigaOm’s research bulletin for May 2023 Hi and welcome back. We’re delighted to share our July-September syndicated research schedule,…
Read MoreKey Criteria for Evaluating Secure Service Access (SSA) Solutions
Secure service access (SSA) represents a significant shift in the way organizations consume network security, enabling them to replace multiple security…
Read MoreStrengthening the Human Firewall: Security Awareness Training
Why do we need cybersecurity awareness training? To me, having put together our Cybersecurity Radar Report, the answer is simple: given…
Read More