Executive Briefing What Happened: A stealthy, persistent backdoor was discovered in over 16,000 Fortinet firewalls. This wasn’t a new vulnerability –…
Read MoreSubscribe to GigaOm Premium Research for help making decisions and purchasing technologies
$12/month
Billed Annually
Already a subscriber? Sign in
Yearly individual access to the latest research for making decisions and purchasing technologies
Unlimited reports
Executive Briefing What Happened: A stealthy, persistent backdoor was discovered in over 16,000 Fortinet firewalls. This wasn’t a new vulnerability –…
Read MoreData is core to all organizations, serving as a critical business asset that drives decision making. The importance of data has…
Read MoreAttacker techniques and behaviors are constantly evolving. As cybersecurity vendors zig, attackers zag. This creates an environment where what worked in…
Read MoreCybersecurity technology, and more specifically deception technology, has become increasingly important in today’s digital landscape. Deception solutions, including baits, lures, and…
Read MoreIdentity and access management (IAM) technology ensures that only authorized users have access to specific resources within an organization. IAM solutions…
Read MoreFirewalls have been a staple of network security for decades, sitting at the perimeter of an organization’s network and using stateful…
Read More