Cloud workload security (CWS) has evolved into an essential enterprise security framework, providing comprehensive protection for diverse cloud workloads across major…
Read MoreResearch
Making Sense of Cybersecurity – Part 2: Delivering a Cost-effective Response
At Black Hat Europe last year, I sat down with one of our senior security analysts, Paul Stringfellow. In this section…
Read MoreMaking Sense of Cybersecurity – Part 1: Seeing Through Complexity
At the Black Hat Europe conference in December, I sat down with one of our senior security analysts, Paul Stringfellow. In…
Read MoreGigaOm Key Criteria for Evaluating Unified Endpoint Management (UEM) Solutions
The allocation of resources toward information technology-based endpoints is a significant part of any modern IT budget. The contemporary IT landscape…
Read MoreGigaOm Key Criteria for Evaluating Container Security Solutions
Container security solutions are comprehensive tools designed to protect containerized applications and their underlying infrastructure throughout the software development lifecycle, from…
Read MoreGigaOm Key Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions are converged security operations (SecOps) tools that handle data ingestion and management, threat hunting, orchestration,…
Read MoreGigaOm Key Criteria for Evaluating Secure Access Service Edge (SASE) Solutions
Secure access service edge (SASE) is a cloud-based architecture converging networking and security functions into a unified, scalable solution to address…
Read MoreGigaOm Key Criteria for Evaluating Ransomware Prevention Solutions
Ransomware continues to be a high-priority threat for all organizations, and as with all cybersecurity challenges, the threat continues to evolve…
Read MoreGigaOm Key Criteria for Evaluating Software Supply Chain Security (SSCS) Solutions
Software supply chain security (SSCS) solutions are a blend of specialized technologies and tools designed to protect the entire software development…
Read MoreGigaOm Key Criteria for Evaluating Penetration Testing as a Service (PTaaS)
Penetration testing as a service (PTaaS) is a cloud-based solution that provides on-demand security testing to organizations. It offers continuous vulnerability…
Read MoreWhere’s Security Going in 2025?
Few areas of technology are moving as fast as security, so what gives and how is it going to evolve in…
Read MoreGigaOm Radar for Application & API Security
Application and API security encompasses a suite of tools and practices designed to protect software applications and their interconnected APIs from…
Read More