Howard Holton and Jon Collins meet with Tyler Reese of Netwrix to discuss identity security.
Watch NowResearch
The Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis
In the ever-evolving cyberthreat landscape, cybercriminals are deploying sophisticated methods to exploit network vulnerabilities while organizations constantly seek new ways to…
Read MoreEmbracing the Future: A Vision for the CASB Market
As we stand on the cusp of a new era in cloud security, the landscape of cloud access security brokers (CASB)…
Read MoreAre We Taking Enterprise Password Management Seriously?
Passwords are the keys to your digital assets: it’s how we access applications and data, as well as infrastructure and systems.…
Read MoreThe Future of ZTNA: A Convergence of Network Access Solutions
Zero trust network access (ZTNA) has emerged as a crucial security paradigm for organizations seeking to secure their applications and data…
Read MoreSaaS Security Posture—It’s not you, it’s me!
In business, it’s not uncommon to take a software-as-a-service (SaaS)-first approach. It makes sense—there’s no need to deal with the infrastructure,…
Read MoreNavigating the Unique Landscape of OT Security Solutions
Exploring the operational technology (OT) security sector has been both enlightening and challenging, particularly due to its distinct priorities and requirements…
Read MoreGigaOm Key Criteria for Evaluating API Security Solutions
Application programming interfaces (APIs) are now central to modern software development, but as their use has skyrocketed, intrusions that successfully exploit…
Read MoreCxO Decision Brief: Offensive Security Testing and Pentest as a Service
This GigaOm CxO Decision Brief commissioned by Cobalt. Offensive Security Testing (OST) is a proactive approach to cybersecurity that encompasses traditional…
Read MoreOperations Leadership Lessons from the Crowdstrike Incident
Much has been written about the whys and wherefores of the recent Crowdstrike incident. Without dwelling too much on the past…
Read MoreGigaOm Radar for SaaS Security Posture Management (SSPM)
Software as a service (SaaS) product offerings have been a major boon to productivity. Teams and businesses have gotten exactly the…
Read More5G for Connected Workers: Transforming Remote Work
This GigaOm report was commissioned by T-Mobile. The advent of 5G technology is revolutionizing a wide range of industries, especially for…
Read More