At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreSubscribe to GigaOm Premium Research for help making decisions and purchasing technologies
$12/month
Billed Annually
Already a subscriber? Sign in
Yearly individual access to the latest research for making decisions and purchasing technologies
Unlimited reports
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreAt the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreThe allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read MoreContainer security solutions are comprehensive tools designed to protect containerized applications and their underlying infrastructure throughout the software development lifecycle, from…
Read MoreAutonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read MoreSecure access service edge (SASE) is a cloud-based architecture converging networking and security functions into a unified, scalable solution to address…
Read More