The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreVulnerability management is a mature component of the cybersecurity ecosystem. It has become a commodity function, an expected part of every organization’s…
Read MoreMultifactor authentication (MFA) addresses one of the most vulnerable elements in cybersecurity—humans. As most attacks are enabled through social engineering, MFA intervenes…
Read MoreIn February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection Platforms.”…
Read MoreAn ever-increasing number of organizations are moving data and applications to the cloud; however, concerns regarding this approach remain—in particular, the perceived…
Read MoreIn February 2020, GigaOm published its first analysis of the phishing detection and prevention market, “Key Criteria for Evaluating Phishing Protection Platforms.”…
Read MoreThe migration of IT support and IT business systems to the cloud is becoming the new way of doing business. Common variations…
Read MoreRisk-based cyber defense strategies and secure infrastructures require validated and actionable threat intelligence (TI). The adoption of intelligence-based approaches for enterprise security…
Read MoreSecure service access (SSA) represents a significant shift in the way organizations consume network security. Replacing multiple point products with a single…
Read MoreEffective risk-based cyber-defense strategies and infrastructures rely on validated and actionable threat intelligence (TI). Comprehensive solutions collect or procure threat intelligence data…
Read MoreIdentity is at the core of the modern business environment. It’s the control plane for how users, partners, and customers interact with…
Read MoreEvery enterprise has employees, perhaps hundreds or thousands, all of whom are buried in dozens of username and password combinations. How can…
Read MoreSecure service access (SSA) represents a significant shift in the way network security is consumed. With the IT security arena flooded with…
Read MorePrivileged access management (PAM) enables administrative access to critical IT systems while minimizing the chances of security compromises through monitoring, policy enforcement,…
Read MoreThis free one-hour webinar from GigaOm Research brings together experts in e-zignatures, featuring GigaOm analyst Bill Witter and special guest from Nitro,…
Watch NowThe convergence of operational technology (OT) and information technology (IT) brings benefits and risks. Industrial plants and systems are designed for long…
Read MoreUser access management, or identity and access management (IAM), is a critical part of enterprise IT. It has long allowed organizations to…
Read MoreVirtual private networks (VPNs) have long been the default method of securing remote access. VPNs provided a way to prevent exposing internal…
Read MoreEnterprise cybersecurity is typically composed of multiple security solutions from various vendors combined with a security information and event management (SIEM) and/or…
Read MoreEnterprise cybersecurity is typically composed of multiple solutions from various vendors, combined with a security information and event management (SIEM) and/or security…
Read MoreAs industries adopt hybrid operating models, e-signature solutions have become a critical tool for supporting traditional business functions. The e-signature market has…
Read MoreOver the last couple of years, ransomware has taken center stage in data protection, but very few people realize it is only…
Read MoreThe use of artificial intelligence (AI)—typically in some form of machine learning (ML) designed for anomaly detection—is the norm today across the…
Read MoreThe banking and financial services industry—and any large organization processing payments—faces a challenge with fraudulent activity. The move of many businesses to…
Read MoreVirtual private networks (VPNs) have traditionally been the default method of secure remote access. They provided an alternative to exposing internal systems’…
Read More