The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreThe infrastructure surrounding containers is complex on many levels. Registries hold container images from base image to complete application image. Container orchestrators…
Read MorePenetration testing has long been a technique used by security teams to find vulnerabilities in their systems and applications, enabling them to…
Read MoreContainers have revolutionized the way that IT views servers. While virtual machines (VMs) allowed users to run many logical servers on a…
Read MorePenetration testing has long been a technique used by organizations to find vulnerabilities in their systems and applications, enabling them to improve…
Read MoreSecurity information and event management (SIEM) solutions have been the main monitoring tools for security operations centers (SOCs). As they observe more…
Read MoreThis free one-hour webinar from GigaOm Research features analyst Jake Dolezal and will compares four web application firewall (WAF) security platforms designed…
Watch NowThe nature of business has changed from digitally enabled to digital first, and that has forced businesses to rethink how security is…
Read MoreData, web, and application security have evolved dramatically over the past few years. Just as new threats abound, the architecture of applications—how…
Read MoreSecurity orchestration, automation, and response (SOAR) emerged as a product category in the mid-2010s. At that point, SOAR solutions were based on…
Read MoreDepending on the size of an organization, security information and event management (SIEM) tools can produce tens of thousands of alarms per…
Read MoreThe endpoint is, in some ways, an unusual problem forced upon organizations and security teams. Endpoints are portals through which sensitive data…
Read MoreSecurity information and event management (SIEM) solutions consolidate multiple security data streams under a single roof. Initially, SIEM supported early detection of…
Read MoreWith ransomware getting all the news coverage when it comes to internet threats, it’s easy to lose sight of distributed denial of…
Read MoreAPIs are quickly becoming the largest attack surface in applications. API security solutions help an organization improve its security posture by finding…
Read MoreApplication programming interfaces (APIs) have been a growing attack surface—and a commensurately growing problem—for more than a decade. There have been some…
Read MoreThe endpoint presents, in some ways, an unusual problem forced upon organizations and security teams. Endpoints are portals through which sensitive data…
Read MoreAlthough ransomware is making all the headlines today, it’s not the only kind of attack that businesses should arm themselves against. Distributed…
Read MoreMultifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more verification factors to gain access to…
Read MoreToo often security teams struggle to make do with suboptimal, legacy, on-premises architectures. These architectures are filled with bolt-on security solutions that…
Read MoreToo often, security teams struggle to make do with suboptimal, legacy on-premises architectures. These architectures are filled with bolt-on security solutions that…
Read MorePrivileged credentials (or administrator rights) are a top target for attackers from outside an organization, and even from among unhappy staff within,…
Read MoreData is at the core of today’s enterprise, and ensuring it’s protected and secure is at the top of every enterprise’s agenda.…
Read MoreVulnerability management is a mature component of the cybersecurity ecosystem. It has become a commodity function, an expected part of every organization’s…
Read MoreMultifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA intervenes…
Read More