Vulnerability management is now a cornerstone of digital security frameworks and should be a part of every organization’s cybersecurity plan. This…
Read MoreResearch
GigaOm Radar for Application Security Testing (AST)
In the face of relentless cyber threats and an ever-expanding attack surface, robust application security testing (AST) has become an indispensable…
Read MoreGigaOm Solution Profile: Cogility TacitRed
This GigaOm Solution Profile commissioned by Cogility. Cogility TacitRed provides security analysts with continuous external threat intelligence, offering evidence-based, prioritized insights…
Read MoreGigaOm Radar for Data Loss Prevention (DLP)
Data is a precious resource for today’s enterprises, and preventing its loss is of paramount importance. The cost of data loss…
Read MoreDiscovering Disruptions in Tech with Rob McNutt of Forescout
Forescout’s SVP of Network Security Rob McNutt joins GigaOm COO Howard Holton at Blackhat to discuss cyber security in tech today.
Watch NowDiscovering Disruptions in Tech with Matt Hum of DEFCON at Blackhat
COO Howard Holton is joined by Matt Hum at Blackhat to discuss the state of security and threats like ransomware in…
Watch NowDiscovering Disruptions in Tech – At Blackhat with Ziv Dines of Armis
GigaOm CTO Howard Holton is joined by fellow CTO Ziv Dines of Armis at Black Hat, a hacker’s summer camp, to…
Watch NowDiscovering Disruptions in Tech at Blackhat with Chandra Sekar of AppOmni
Howard Holton travels to Blackhat to discuss security with Chandra Sekar, the CMO at AppOmni.
Watch NowGigaOm Radar for Secure Enterprise Browsing
Secure enterprise browsing solutions enable users to access websites and web-based resources in compliance with corporate security policies and provide security…
Read MoreThe Good The Bad & The Techy – Identity Security with Tyler Reese
Howard Holton and Jon Collins meet with Tyler Reese of Netwrix to discuss identity security.
Watch NowThe Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis
In the ever-evolving cyberthreat landscape, cybercriminals are deploying sophisticated methods to exploit network vulnerabilities while organizations constantly seek new ways to…
Read MoreEmbracing the Future: A Vision for the CASB Market
As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB)…
Read More