At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreSubscribe to GigaOm Premium Research for help making decisions and purchasing technologies
$12/month
Billed Annually
Already a subscriber? Sign in
Yearly individual access to the latest research for making decisions and purchasing technologies
Unlimited reports
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreAt the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreIntelligent automation and hyperautomation have become technology buzzwords over the last few years. They represent the next evolutionary step following previous…
Read MoreNetwork as a service (NaaS) is a cloud-based networking model that allows organizations to manage and scale their network infrastructure through…
Read MoreCloud workload security (CWS) is a critical component of modern cybersecurity strategies, focusing on protecting the dynamic and ever-expanding workloads in…
Read MoreThe allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read More