In today’s fast-paced, highly competitive market, technology vendors often struggle to connect with their customers on a meaningful level. Traditional marketing…
Read MoreResearch
Securing Identities: The Foundation of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into data security, exploring…
Read MoreProtecting Your Crown Jewels
Welcome back to our zero trust blog series! In the previous posts, we introduced the concept of zero trust and explored…
Read MoreBuilding Blocks of Zero Trust: A Comprehensive Guide
In our previous post, we introduced the concept of zero trust and explored why it’s becoming an essential approach to cybersecurity…
Read MoreReflections on Snowflake Summit 2024
This past week, I had the opportunity to attend Snowflake Summit 2024 in San Francisco. As an analyst, I was treated…
Read MoreZero Trust 101: It’s Time to Ditch “Trust but Verify”
Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of…
Read MoreNear, Far, Wherever Your CPUs Are
Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best,…
Read MoreThe Challenge of Securing User Identities
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in…
Read MoreCould Network Modeling Replace Observability?
Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based…
Read MoreOn Questionnaires and Briefings: Explaining the GigaOm Policy Change
A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are…
Read MoreEverything Your Parents Told You About Posture Is True! Even For Data Security
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up.…
Read MoreSSE vs. SASE: Which One is Right for Your Business?
Security service edge (SSE) and secure access service edge (SASE) are designed to cater to the evolving needs of modern enterprises…
Read MoreSave Money and Increase Performance on the Cloud
One of the most compelling aspects of cloud computing has always been the potential for cost savings and increased efficiency. Seen…
Read MoreThere’s Nothing Micro About Microsegmentation
I began my exploration of the microsegmentation space by semantically deconstructing the title. The result? Microsegmentation solutions help define network segments…
Read MoreThe Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity’s Next Generation
Embarking on an exploration of the extended detection and response (XDR) sector wasn’t just another research project for me; it was…
Read MoreDebunking Myths: All Network Operating Systems are NOT Created Equal
With the network no longer a commodity but a strategic partner in digital transformation, network operating systems (NOSs) have become indispensable.…
Read MoreFrom Resistance to Resilience: A Strategic Approach to NetDevOps Integration
NetDevOps is revolutionizing the way networking teams operate by integrating DevOps principles into network management. It contributes to network resilience by…
Read MoreNavigating the SEC Cybersecurity Ruling
The latest SEC ruling on cybersecurity will almost certainly have an impact on risk management and post-incident disclosure, and CISOs will…
Read MoreWeathering the Storm: Disaster Recovery and Business Continuity as a Service (DR/BCaaS) in 2024
Disruption is the new normal. Cyberattacks, natural disasters, and unforeseen technical glitches can cripple even the most prepared businesses. In today’s…
Read MoreUnlocking the Future of Edge Computing: The Pivotal Role of Kubernetes in Navigating the Next Network Frontier
Edge computing represents a significant shift in the IT landscape, moving data processing closer to the source of data generation rather…
Read MoreUnleash Your Unstructured Data: A Strategic Playbook
The vast and ever-expanding sea of unstructured data—filled with emails, documents, images, sensor data, and more—represents a potential goldmine for organizations.…
Read MoreHarnessing the Power of Cloud Performance Testing
Cloud performance testing provides flexibility, cost savings, global reach, automation, and comprehensive insights. It’s a powerful ally in delivering high-quality applications…
Read MoreChaos Theory and Observability
Can observability deal with the IT chaos facing so many enterprises today? It’s a question worth digging into. IT Chaos (Monitoring,…
Read MoreThe Time is Right to Review Your Enterprise Firewalls
Firewalls, we all have one. It’s a well-established market, full of vendors with mature stacks of technology. Firewalls do a number…
Read More