Security & Risk Archives - Gigaom https://gigaom.com/domain/security-risk/ Your industry partner in emerging technology research Fri, 10 Jan 2025 21:35:06 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://gigaom.com/wp-content/uploads/sites/1/2024/05/d5fd323f-cropped-ff3d2831-gigaom-square-32x32.png Security & Risk Archives - Gigaom https://gigaom.com/domain/security-risk/ 32 32 GigaOm Radar for Cloud Workload Security https://gigaom.com/report/gigaom-radar-for-cloud-workload-security/ Wed, 15 Jan 2025 16:00:20 +0000 https://gigaom.com/?post_type=go-report&p=1041712/ Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major cloud

The post GigaOm Radar for Cloud Workload Security appeared first on Gigaom.

]]>
Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major cloud service providers and on-premises environments. CWS solutions deliver critical capabilities in policy enforcement, threat detection, and automated response mechanisms, which are particularly vital for containerized and Kubernetes environments.

The imperative for CWS adoption stems from the increasing complexity of cloud environments and the escalating sophistication of cyberthreats. For C-suite executives, CWS represents a strategic investment in risk management and operational efficiency. The financial implications of security breaches and compliance violations can be severe, with costs extending beyond immediate financial losses to long-term reputational damage. CWS solutions address these concerns by providing advanced threat prevention, detection, and response capabilities that surpass native cloud provider security controls.

The 2024 market analysis focuses exclusively on vendors offering comprehensive CWS solutions that can be deployed across multiple cloud environments. A significant evolution in this year’s assessment reflects the market’s technological advancement, particularly in artificial intelligence (AI) and automation capabilities. Notably, workload policy management has become a standard offering, while remediation powered by large language models (LLMs) and integrations with CI/CD tools have emerged as key differentiating features.

The scope of evaluation has expanded to acknowledge the convergence of security and development workflows, reflecting the industry’s shift toward integrated DevSecOps practices. This evolution addresses the growing demand for security solutions that can operate at cloud scale while maintaining operational efficiency. The market has matured significantly, with vendors now offering more sophisticated capabilities in automated threat response, compliance management, and risk assessment.

These refinements in evaluation criteria align with enterprise requirements for more robust, automated security solutions that can protect cloud workloads effectively while supporting business agility and innovation. The emphasis on advanced features demonstrates the market’s progression toward more sophisticated, AI-driven security solutions that can address the complexities of modern cloud environments

This is our second year evaluating the CWS space in the context of our Key Criteria and Radar reports. This report builds on our previous analysis and considers how the market has evolved over the last year.

This GigaOm Radar report examines 17 of the top CWS solutions and compares offerings against the capabilities (table stakes, key features, and emerging features) and nonfunctional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the market, identify leading CWS offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision.

GIGAOM KEY CRITERIA AND RADAR REPORTS

The GigaOm Key Criteria report provides a detailed decision framework for IT and executive leadership assessing enterprise technologies. Each report defines relevant functional and nonfunctional aspects of solutions in a sector. The Key Criteria report informs the GigaOm Radar report, which provides a forward-looking assessment of vendor solutions in the sector.

The post GigaOm Radar for Cloud Workload Security appeared first on Gigaom.

]]>
Making Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response https://gigaom.com/2025/01/09/making-sense-of-cybersecurity-part-2-delivering-a-cost-effective-response/ Thu, 09 Jan 2025 17:34:37 +0000 https://gigaom.com/?p=1041958 At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section of

The post Making Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response appeared first on Gigaom.

]]>
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section of our conversation (you can find the first part here), we discuss balancing cost and efficiency, and aligning security culture across the organization.

Jon: So, Paul, in an environment with problems everywhere, and you’ve got to fix everything, we need to move beyond that. In the new architectures we now have, we need to be thinking smarter about our overall risk. This ties into cost management and service management—being able to grade our architecture in terms of actual risk and exposure from a business perspective.

So, I’m kind of talking myself into needing to buy a tool for this because I think that in order to cut through the 50 tools, I first need a clear view of our security posture. Then, we can decide which of the tools we have actually respond to that posture because we’ll have a clearer picture of how exposed we are.

Paul: Buying a tool goes back to vendors’ hopes and dreams—that one tool will fix everything. But I think the reality is that it’s a mix of understanding what metrics are important. Understanding the information we’ve gathered, what’s important, and balancing that with the technology risk and the business impact. You made a great point before: if something’s at risk but the impact is minimal, we have limited budgets to work with. So where do we spend? You want the most “bang for your buck.”

So, it’s understanding the risk to the business. We’ve identified the risk from a technology point of view, but how significant is it to the business? And is it a priority? Once we’ve prioritized the risks, we can figure out how to address them. There’s a lot to unpack in what you’re asking. For me, it’s about doing that initial work to understand where our security controls are and where our risks lie. What really matters to us as an organization? Go back to the important metrics—eliminating the noise and identifying metrics that help us make decisions. Then, look at whether we’re measuring those metrics. From there, we assess the risks and put the right controls in place to mitigate them. We do that posture management work. Are the tools we have in place responding to that posture? This is just the internal side of things, but there’s also external risk, which is a whole other conversation, but it’s the same process.

So, looking at the tools we have, how effective are they in mitigating the risks we’ve identified? There are lots of risk management frameworks, so you can probably find a good fit, like NIST or something else. Find a framework that works for you, and use that to evaluate how your tools are managing risk. If there’s a gap, look for a tool that fills that gap.

Jon: And I was thinking about the framework because it essentially says there are six areas to address, and maybe a seventh could be important to your organization. But at least having the six areas as a checkbox: Am I dealing with risk response? Am I addressing the right things? It gives you that, not Pareto view, but it’s about diminishing returns—cover the easiest stuff first. Don’t try to fix everything until you’ve fixed the most common issues. That’s what people are trying to do right now.

Paul: Yeah, I think—let me quote another podcast I do, where we do “tech takeaways.” Yeah, who knew? I thought I’d plug it. But if you think about the takeaways from this conversation, I think, you know, going back to your question—what should I be considering as an organization? I think the starting point is probably to take a step back. As a business, as an IT leader inside that business, am I taking a step back to really understand what risk looks like? What does risk look like to the business, and what needs to be prioritized? Then, we need to assess whether we’re capable of measuring our efficacy against that risk. We’re getting lots of metrics and lots of tools. Are those tools effective in helping us avoid the risks we deem important for the business? Once we’ve answered those two questions, we can then look at our posture. Are the tools in place giving us the kind of controls we need to deal with the threats we face? Context is huge.

Jon: On that note, I’m reminded of how organizations like Facebook, for example, had a pretty high tolerance for business risk, especially around customer data. Growth was everything—just growth at all costs. So, they were prepared to manage the risks to achieve that. It ultimately boils down to assessing and taking those risks. At that point, it’s no longer a technical conversation.

Paul: Exactly. It probably never is just a technical conversation. To deliver projects that address risk and security, it should never be purely technical-led. It impacts how the company operates and the daily workflow. If everyone doesn’t buy into why you’re doing it, no security project is going to succeed. You’ll get too much pushback from senior people saying, “You’re just getting in the way. Stop it.” You can’t be the department that just gets in the way. But you do need that culture across the company that security is important. If we don’t prioritize security, all the hard work everyone’s doing could be undone because we haven’t done the basics to ensure there aren’t vulnerabilities waiting to be exploited.

Jon: I’m just thinking about the number of conversations I’ve had with vendors on how to sell security products. You’ve sold it, but then nothing gets deployed because everyone else tries to block it—they didn’t like it. The reality is that the company needs to work towards something and make sure everything aligns to deliver it.

Paul: One thing I’ve noticed over my 30-plus years in this job is how vendors often struggle to explain why they might be valuable to a business. Our COO, Howard Holton, is a big advocate of this argument—that vendors are terrible at telling people what they actually do and where the benefit lies for a business. But one thing he said to me yesterday was about their approach. One representative I know works for a vendor offering an orchestration and automation tool, but when he starts a meeting, the first thing he does is ask why automation hasn’t worked for the customer. Before he pitches his solution, he takes the time to understand where their automation problems are. If more of us did that—vendors and others alike—if we first asked, “What’s not working for you?” maybe we’d get better at finding the things that will work.

Jon: So we have two takeaways for end users – to focus on risk management, and to simplify and refine security metrics. And for vendors, the takeaway is to understand the customer’s challenges before pitching a solution. By listening to the customer’s problems and needs, vendors can provide relevant and effective solutions, rather than simply selling their aspirations. Thanks, Paul!

The post Making Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response appeared first on Gigaom.

]]>
Making Sense of Cybersecurity – Part 1: Seeing Through Complexity https://gigaom.com/2025/01/09/making-sense-of-cybersecurity-part-1-seeing-through-complexity/ Thu, 09 Jan 2025 10:30:05 +0000 https://gigaom.com/?p=1041862 At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In this

The post Making Sense of Cybersecurity – Part 1: Seeing Through Complexity appeared first on Gigaom.

]]>
At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In this first part of our conversation we discuss the complexity of navigating cybersecurity tools, and defining relevant metrics to measure ROI and risk.

Jon: Paul, how does an end-user organization make sense of everything going on? We’re here at Black Hat, and there’s a wealth of different technologies, options, topics, and categories. In our research, there are 30-50 different security topics: posture management, service management, asset management, SIEM, SOAR, EDR, XDR, and so on. However, from an end-user organization perspective, they don’t want to think about 40-50 different things. They want to think about 10, 5, or maybe even 3. Your role is to deploy these technologies. How do they want to think about it, and how do you help them translate the complexity we see here into the simplicity they’re looking for?

Paul: I attend events like this because the challenge is so complex and rapidly evolving. I don’t think you can be a modern CIO or security leader without spending time with your vendors and the broader industry. Not necessarily at Black Hat Europe, but you need to engage with your vendors to do your job.

Going back to your point about 40 or 50 vendors, you’re right. The average number of cybersecurity tools in an organization is between 40 and 60, depending on which research you refer to. So, how do you keep up with that? When I come to events like this, I like to do two things—and I’ve added a third since I started working with GigaOm. One is to meet with vendors, because people have asked me to. Two, go to some presentations. Three is to walk around the Expo floor talking to vendors, particularly ones I’ve never met, to see what they do. 

I sat in a session yesterday, and what caught my attention was the title: “How to identify the cybersecurity metrics that are going to deliver value to you.” That caught my attention from an analyst’s point of view because part of what we do at GigaOm is create metrics to measure the efficacy of a solution in a given topic. But if you’re deploying technology as part of SecOps or IT operations, you’re gathering a lot of metrics to try and make decisions. One of the things they talked about in the session was the issue of creating so many metrics because we have so many tools that there’s so much noise. How do you start to find out the value?

The long answer to your question is that they suggested something I thought was a really smart approach: step back and think as an organization about what metrics matter. What do you need to know as a business? Doing that allows you to reduce the noise and also potentially reduce the number of tools you’re using to deliver those metrics. If you decide a certain metric no longer has value, why keep the tool that provides it? If it doesn’t do anything other than give you that metric, take it out. I thought that was a really interesting approach. It’s almost like, “We’ve done all this stuff. Now, let’s think about what actually still matters.”

This is an evolving space, and how we deal with it must evolve, too. You can’t just assume that because you bought something five years ago, it still has value. You probably have three other tools that do the same thing by now. How we approach the threat has changed, and how we approach security has changed. We need to go back to some of these tools and ask, “Do we really need this anymore?”

Jon: We measure our success with this, and, in turn, we’re going to change.

Paul: Yes, and I think that’s hugely important. I was talking to someone recently about the importance of automation. If we’re going to invest in automation, are we better now than we were 12 months ago after implementing it? We’ve spent money on automation tools, and none of them come for free. We’ve been sold on the idea that these tools will solve our problems. One thing I do in my CTO role, outside of my work with GigaOm, is to take vendors’ dreams and visions and turn them into reality for what customers are asking for.

Vendors have aspirations that their products will change the world for you, but the reality is what the customer needs at the other end. It’s that kind of consolidation and understanding—being able to measure what happened before we implemented something and what happened after. Can we show improvements, and has that investment had real value?

Jon: Ultimately, here’s my hypothesis: Risk is the only measure that matters. You can break that down into reputational risk, business risk, or technical risk. For example, are you going to lose data? Are you going to compromise data and, therefore, damage your business? Or will you expose data and upset your customers, which could hit you like a ton of bricks? But then there’s the other side—are you spending way more money than you need, to mitigate risks? 

So, you get into cost, efficiency, and so on, but is this how organizations are thinking about it? Because that’s my old-school way of viewing it. Maybe it’s moved on.

Paul: I think you’re on the right track. As an industry, we live in a little echo chamber. So when I say “the industry,” I mean the little bit I see, which is just a small part of the whole industry. But within that part, I think we are seeing a shift. In customer conversations, there’s a lot more talk about risk. They’re starting to understand the balance between spending and risk, trying to figure out how much risk they’re comfortable with. You’re never going to eliminate all risk. No matter how many security tools you implement, there’s always the risk of someone doing something stupid that exposes the business to vulnerabilities. And that’s before we even get into AI agents trying to befriend other AI agents to do malicious things—that’s a whole different conversation.

Jon: Like social engineering?

Paul: Yeah, very much so. That’s a different show altogether. But, understanding risk is becoming more common. The people I speak to are starting to realize it’s about risk management. You can’t remove all the security risks, and you can’t deal with every incident. You need to focus on identifying where the real risks lie for your business. For example, one criticism of CVE scores is that people look at a CVE with a 9.8 score and assume it’s a massive risk, but there’s no context around it. They don’t consider whether the CVE has been seen in the wild. If it hasn’t, then what’s the risk of being the first to encounter it? And if the exploit is so complicated that it’s not been seen in the wild, how realistic is it that someone will use it?

It’s such a complicated thing to exploit that nobody will ever exploit it. It has a 9.8, and it shows up on your vulnerability scanner saying, “You really need to deal with this.” The reality is that you have already seen a shift where there’s no context applied to that—if we’ve seen it in the wild.

Jon: Risk equals probability multiplied by impact. So you’re talking about probability and then, is it going to impact your business? Is it affecting a system used for maintenance once every six months, or is it your customer-facing website? But I’m curious because back in the 90s, when we were doing this hands-on, we went through a wave of risk avoidance, then went to, “We’ve got to stop everything,” which is what you’re talking about, through to risk mitigation and prioritizing risks, and so on. 

But with the advancement of the Cloud and the rise of new cultures like agile in the digital world, it feels like we’ve gone back to the direction of, “Well, you need to prevent that from happening, lock all the doors, and implement zero trust.” And now, we’re seeing the wave of, “Maybe we need to think about this a bit smarter.”

Paul: It’s a really good point, and actually, it’s an interesting parallel you raise. Let’s have a little argument while we’re recording this. Do you mind if I argue with you? I’ll question your definition of zero trust for a moment. So, zero trust is often seen as something trying to stop everything. That’s probably not true of zero trust. Zero trust is more of an approach, and technology can help underpin that approach. Anyway, that’s a personal debate with myself. But, zero trust…

Now, I’ll just crop myself in here later and argue with myself. So, zero trust… If you take it as an example, it’s a good one. What we used to do was implicit trust—you’d log on, and I’d accept your username and password, and everything you did after that, inside the secure bubble, would be considered valid with no malicious activity. The problem is, when your account is compromised, logging in might be the only non-malicious thing you’re doing. Once logged in, everything your compromised account tries to do is malicious. If we’re doing implicit trust, we’re not being very smart.

Jon: So, the opposite of that would be blocking access entirely?

Paul: That’s not the reality. We can’t just stop people from logging in. Zero trust allows us to let you log on, but not blindly trust everything. We trust you for now, and we continuously evaluate your actions. If you do something that makes us no longer trust you, we act on that. It’s about continuously assessing whether your activities are appropriate or potentially malicious and then acting accordingly.

Jon: It’s going to be a very disappointing argument because I agree with everything you say. You argued with yourself more than I’m going to be able to, but I think, as you said, the castle defense model—once you’re in, you’re in. 

I’m mixing two things there, but the idea is that once you’re inside the castle, you can do whatever you like. That’s changed. 

So, what to do about it? Read Part 2, for how to deliver a cost-effective response. 

The post Making Sense of Cybersecurity – Part 1: Seeing Through Complexity appeared first on Gigaom.

]]>
GigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions https://gigaom.com/report/gigaom-key-criteria-for-evaluating-unified-endpoint-management-uem-solutions-2/ Fri, 03 Jan 2025 20:27:12 +0000 https://gigaom.com/?post_type=go-report&p=1041779/ The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape features

The post GigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions appeared first on Gigaom.

]]>
The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape features a distributed workforce relying on a diverse range of devices to access broad portfolios of enterprise applications and data. Amid this complexity, IT teams face the challenging task of managing, configuring, and securing all types of network endpoints–including mobile devices, desktops, laptops, and increasingly the adoption of non-end user devices such as operational technology components and IoT sensors.

Failing to effectively manage endpoints can have significant ramifications for an organization. Poor management of these business assets can impact the balance sheet, user experience, and operational efficiency, while also introducing major security risks. Addressing these problems should be a priority for the diligent IT executive. Striking this balance requires achieving an appropriate equilibrium between user experience and enterprise control, as overemphasising one at the expense of the other is often counterproductive.

For example, excessive restrictions or device lockdowns can hinder employee flexibility and productivity. Unified endpoint management (UEM) solutions, however, enable organizations to enhance endpoint experiences for users while maintaining robust security control.

Business Imperative
The importance of effective endpoint management in modern organizations cannot be overstated. To achieve this, organizations must solve two issues:

  • For end-user devices, a solution should provide employees with sustained access to applications and data while ensuring the security and control of business-critical data assets.
  • For diverse endpoints, organizations must manage not only desktops and laptops but also servers, operational technology, and IoT devices.

UEM solutions bring user and device management together into a single pane of glass view and allow organizations to perform the following:

  • Manage devices through a centralized console.
  • Manage device lifecycle from enrollment to deactivation.
  • Ensure device sustainability.
  • Create and enforce security policies.
  • Patch and update devices and applications.
  • Enhance IT and end user experience.
  • Ensure devices are included as part of an overall security strategy.

Effective UEM solutions help deliver an overall better user experience, improve operational efficiency, and maintain strong endpoint security.

Endpoints represent a significant investment for most organizations, comprising a significant part of the IT budget. Neglecting to effectively manage, maintain and protect these critical assets would be a dereliction of duty.

Sector Adoption Score
To help executives and decision-makers evaluate the potential impact and value of deploying a UEM solution, this GigaOm Key Criteria report provides a structured assessment of the sector across five factors: benefit, maturity, urgency, impact, and effort. By scoring each factor based on how strongly it compels or deters adoption of a UEMsolution, we provide an overall Sector Adoption Score (Figure 1) of 3.8 out of 5, with 5 indicating the strongest possible recommendation to adopt. This indicates that a UEM solution is a credible candidate for deployment and worthy of thoughtful consideration.

The factors contributing to the Sector Adoption Score for UEM are explained in more detail in the Sector Brief section that follows.

Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions

Sector Adoption Score

1.0