Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data…
Read MoreResearch
SaaS Security Posture—It’s not you, it’s me!
In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure,…
Read MoreNavigating the Unique Landscape of OT Security Solutions
Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements…
Read MoreThe Rapidly Changing Landscape of Enterprise Object Storage
For a long time, enterprise object storage was positioned for archive and backup workloads—hardly the most exciting task, yet certainly a…
Read MoreSaaS Management and Application Discovery
The old saying, “history doesn’t repeat itself, but it often rhymes,” proves itself time and again with computers. In my recent…
Read MoreOperations Leadership Lessons from the Crowdstrike Incident
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past…
Read MoreWhy isn’t “Just SIEM” Enough?
There’s a legacy connotation attached to SIEM that has led to vendors advertising themselves as some iteration of a next-generation solution.…
Read MoreWhat Makes Something Edge Native?
In simplistic definitions, the edge is characterized as simply moving workloads closer to end users to reduce network latency associated with…
Read MoreNavigating the CrowdStrike Outage: Insights from a Tech Industry Veteran
As a seasoned CIO/CISO and tech industry analyst with 35 years of experience, I’ve seen my fair share of cybersecurity incidents.…
Read MoreMultigenerational Diversity
It is common in today’s workforce to find multiple generations working alongside each other. While to some extent this has always…
Read MorePutting It All Together: Getting Started with Your Zero Trust Journey
Welcome to the final post in our zero trust blog series! Throughout this series, we’ve explored the key components, best practices,…
Read MoreGovernance and Compliance: Aligning Zero Trust with Business Requirements
Welcome back to our zero trust blog series! In our previous post, we explored the critical role of automation and orchestration…
Read MoreAutomation and Orchestration: The Backbone of Zero Trust
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the critical role of…
Read MoreMonitoring and Analytics: The Eyes and Ears of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into API security and…
Read MoreRedefining Cybersecurity: Leveraging AI for Proactive Defense
In an age where cyber threats are growing exponentially, traditional security measures are no longer sufficient. At RSAC 2024, Cisco’s Jeetu…
Read MoreSecuring APIs: The Cornerstone of Zero Trust Application Security
Welcome to the latest installment of our zero trust blog series! In our previous post, we explored the importance of application…
Read MoreSecuring Applications: Zero Trust for Cloud and On-Premises Environments
Welcome back to our zero trust blog series! In our previous post, we discussed the importance of device security and explored…
Read MoreSecuring Endpoints: Zero Trust for Devices and IoT
Welcome to the next installment of our zero trust blog series! In our previous post, we explored the importance of network…
Read MoreMicrosegmentation: Implementing Zero Trust at the Network Level
Welcome back to our zero trust blog series! In our previous post, we explored the importance of data security and identity…
Read MoreCustomer-Centric Marketing for Technology Vendors
In today’s fast-paced, highly competitive market, technology vendors often struggle to connect with their customers on a meaningful level. Traditional marketing…
Read MoreSecuring Identities: The Foundation of Zero Trust
Welcome back to our zero trust blog series! In our previous post, we took a deep dive into data security, exploring…
Read MoreProtecting Your Crown Jewels
Welcome back to our zero trust blog series! In the previous posts, we introduced the concept of zero trust and explored…
Read MoreBuilding Blocks of Zero Trust: A Comprehensive Guide
In our previous post, we introduced the concept of zero trust and explored why it’s becoming an essential approach to cybersecurity…
Read MoreReflections on Snowflake Summit 2024
This past week, I had the opportunity to attend Snowflake Summit 2024 in San Francisco. As an analyst, I was treated…
Read More