Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major…
Read MoreResearch
Making Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreMaking Sense of Cybersecurity – Part 1: Seeing Through Complexity
At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreGigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions
The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read MoreGigaOm Key Criteria for Evaluating Container Security Solutions
Container security solutions are comprehensive tools designed to protect containerized applications and their underlying infrastructure throughout the software development lifecycle, from…
Read MoreStan Wisseman
Stan Wisseman is a seasoned cybersecurity professional with experience spanning roles like Security Engineer, CISO, and Chief Strategist. He’s passionate about…
Learn MoreGigaOm Key Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read MoreGigaOm Key Criteria for Evaluating Secure Access Service Edge (SASE) Solutions
Secure access service edge (SASE) is a cloud-based architecture converging networking and security functions into a unified, scalable solution to address…
Read MoreGigaOm Key Criteria for Evaluating Ransomware Prevention Solutions
Ransomware continues to be a high-priority threat for all organizations, and as with all cybersecurity challenges, the threat continues to evolve…
Read MoreGigaOm Key Criteria for Evaluating Software Supply Chain Security (SSCS) Solutions
Software supply chain security (SSCS) solutions are a blend of specialized technologies and tools designed to protect the entire software development…
Read MoreGigaOm Key Criteria for Evaluating Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based solution that provides on-demand security testing to organizations. It offers continuous vulnerability…
Read MoreWhere’s Security Going in 2025?
Few areas of technology are moving as fast as security, so what gives and how is it going to evolve in…
Read MoreGigaOm Radar for Application & API Security
Application and API security encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs from…
Read MoreGigaOm Radar for Data Security Platforms
Poorly managed and inadequately secured data leaves organizations at risk of a data breach and increases the costs of storage and…
Read MoreGigaOm Radar for Container Security
Container security technology is a critical component of modern application security, providing comprehensive protection for containerized applications and infrastructure throughout their…
Read MoreGigaOm Radar for Ransomware Prevention
Ransomware remains a high-priority threat for all organizations, continuously evolving alongside the growing sophistication of attackers and their tools. Attacks are…
Read MoreNavigating Technological Sovereignty in the Digital Age
Depending on who you speak to, technological sovereignty is either a hot topic, or something that other organizations need to deal…
Read MoreGigaOm Radar for Software Supply Chain Security
Software supply chain attacks have become highly visible due to extensive media coverage such as of the Solarwinds attack in 2020…
Read MoreGigaOm Radar for Cloud Network Security
Cloud network security solutions provide a suite of security services for single- and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreGigaOm Radar for Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based cybersecurity solution that provides continuous, automated security testing capabilities. It enables organizations…
Read MoreGigaOm Key Criteria for Evaluating Cloud Network Security Solutions
Cloud network security solutions provide a suite of security services for single and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreSeth Byrnes
Seth Byrnes has extensive experience in developing strategic roadmaps, implementing robust technology solutions, and leading cross-functional teams to drive operational excellence.
Learn MoreThe Case for Security.txt
In today’s cybersecurity landscape, it’s not just about having robust defenses—it’s also about building trust and partnerships with the wider security…
Read MoreGigaOm Key Criteria for Evaluating Cloud-Native Application Protection Platforms (CNAPPs)
Cloud-native application protection platforms (CNAPPs) are comprehensive security solutions designed to safeguard cloud-native applications and workloads throughout their entire lifecycle. These…
Read More