2024-11-13 |
The Case for Security.txt |
Howard Holton |
|
2024-11-08 |
DevOps, LLMs, and the Software Development Singularity |
Jon Collins |
|
2024-10-31 |
Unleashing Transformation |
Howard Holton |
|
2024-10-30 |
Preparing for a Billion Developers |
Howard Holton |
|
2024-10-24 |
Driving AI Transformation |
Howard Holton |
|
2024-10-23 |
The Modern CIO |
Howard Holton |
|
2024-10-02 |
Don’t Ignore What You Can Easily Control: Your IP Infrastructure |
Ivan McPhee |
|
2024-10-02 |
The Impact of GenAI on Data Loss Prevention |
Paul Stringfellow |
|
2024-10-02 |
Identity, Endpoint, and Network Security Walk into a Bar |
Andrew Green |
|
2024-10-02 |
Sidecarless Service Meshes: Are They Ready for Prime Time? |
Ivan McPhee |
|
2024-10-02 |
Digital Experience Platforms: Transforming Marketing in the 21st Century |
Sue Clarke |
|
2024-10-02 |
“Gone Phishing”—Every Cyberattacker’s Favorite Phrase |
Paul Stringfellow |
|
2024-10-02 |
Backup to the Future! |
Chester Conforte |
|
2024-10-02 |
Getting Started with Hybrid Cloud Data Protection |
Dr. Shane C. Archiquette |
|
2024-10-02 |
Security Policy as Code: An Architect’s Perspective on the Evolving Landscape |
Whit Walters |
|
2024-10-02 |
How ITIL’s Ownership Transition Impacts the ITSM Market |
Lisa Erickson-Harris |
|
2024-09-06 |
5 Questions for Carsten Brinkschulte, CEO Dryad: Silvanet, early warning for forest fires |
Jon Collins |
|
2024-08-20 |
The Detection Debate: Deep-Packet Inspection vs. Flow-Based Analysis |
Ivan McPhee |
|
2024-08-20 |
Embracing the Future: A Vision for the CASB Market |
Jamal Bihya |
|
2024-08-20 |
Are We Taking Enterprise Password Management Seriously? |
Paul Stringfellow |
|
2024-08-19 |
Edge Orchestration Platforms: Navigating the Next Wave of Innovation |
Dr. Shane C. Archiquette |
|
2024-08-19 |
The Future of ZTNA: A Convergence of Network Access Solutions |
Chris Ray |
|
2024-08-19 |
SaaS Security Posture—It’s not you, it’s me! |
Paul Stringfellow |
|
2024-08-17 |
Navigating the Unique Landscape of OT Security Solutions |
Chris Ray |
|
2024-08-17 |
The Rapidly Changing Landscape of Enterprise Object Storage |
Kirk Ryan |
|
2024-08-17 |
SaaS Management and Application Discovery |
Matt Jallo |
|
2024-08-16 |
Operations Leadership Lessons from the Crowdstrike Incident |
Jon Collins |
|
2024-08-03 |
Why isn’t “Just SIEM” Enough? |
Andrew Green |
|
2024-08-03 |
What Makes Something Edge Native? |
Andrew Green |
|
2024-07-20 |
Navigating the CrowdStrike Outage: Insights from a Tech Industry Veteran |
Howard Holton |
|
2024-07-04 |
Multigenerational Diversity |
Elizabeth Kittner |
|
2024-07-02 |
Putting It All Together: Getting Started with Your Zero Trust Journey |
Howard Holton |
|
2024-07-01 |
Governance and Compliance: Aligning Zero Trust with Business Requirements |
Howard Holton |
|
2024-06-28 |
Automation and Orchestration: The Backbone of Zero Trust |
Howard Holton |
|
2024-06-27 |
Monitoring and Analytics: The Eyes and Ears of Zero Trust |
Howard Holton |
|
2024-06-27 |
Redefining Cybersecurity: Leveraging AI for Proactive Defense |
Howard Holton |
|
2024-06-27 |
Securing APIs: The Cornerstone of Zero Trust Application Security |
Howard Holton |
|
2024-06-25 |
Securing Applications: Zero Trust for Cloud and On-Premises Environments |
Howard Holton |
|
2024-06-15 |
Securing Endpoints: Zero Trust for Devices and IoT |
Howard Holton |
|
2024-06-14 |
Microsegmentation: Implementing Zero Trust at the Network Level |
Howard Holton |
|
2024-06-14 |
Customer-Centric Marketing for Technology Vendors |
William Mapp |
|
2024-06-14 |
Securing Identities: The Foundation of Zero Trust |
Howard Holton |
|
2024-06-13 |
Protecting Your Crown Jewels |
Howard Holton |
|
2024-06-12 |
Building Blocks of Zero Trust: A Comprehensive Guide |
Howard Holton |
|
2024-06-11 |
Reflections on Snowflake Summit 2024 |
Howard Holton |
|
2024-06-08 |
Zero Trust 101: It’s Time to Ditch “Trust but Verify” |
Howard Holton |
|
2024-06-04 |
Near, Far, Wherever Your CPUs Are |
Andrew Green |
|
2024-06-04 |
The Challenge of Securing User Identities |
Paul Stringfellow |
|
2024-06-04 |
Could Network Modeling Replace Observability? |
Andrew Green |
|
2024-05-22 |
On Questionnaires and Briefings: Explaining the GigaOm Policy Change |
Jon Collins |
|
2024-05-18 |
Everything Your Parents Told You About Posture Is True! Even For Data Security |
Paul Stringfellow |
|
2024-05-16 |
SSE vs. SASE: Which One is Right for Your Business? |
Ivan McPhee |
|
2024-05-15 |
Save Money and Increase Performance on the Cloud |
Matt Jallo |
|
2024-05-15 |
There’s Nothing Micro About Microsegmentation |
Andrew Green |
|
2024-04-27 |
The Quest for Extended Detection and Response (XDR): Unraveling Cybersecurity’s Next Generation |
Chris Ray |
|
2024-04-17 |
Debunking Myths: All Network Operating Systems are NOT Created Equal |
Ivan McPhee |
|
2024-04-17 |
From Resistance to Resilience: A Strategic Approach to NetDevOps Integration |
Ivan McPhee |
|
2024-04-17 |
Navigating the SEC Cybersecurity Ruling |
Jon Collins |
|
2024-03-27 |
Weathering the Storm: Disaster Recovery and Business Continuity as a Service (DR/BCaaS) in 2024 |
Dr. Shane C. Archiquette |
|
2024-03-27 |
Unlocking the Future of Edge Computing: The Pivotal Role of Kubernetes in Navigating the Next Network Frontier |
Chester Conforte |
|
2024-03-27 |
Unleash Your Unstructured Data: A Strategic Playbook |
whitneywalters |
|
2024-03-27 |
Harnessing the Power of Cloud Performance Testing |
Dana Hernandez |
|
2024-03-27 |
Chaos Theory and Observability |
Ron Williams |
|
2023-09-06 |
Reviewing Architectural and Data Aspects of Microservices Applications |
Blog ‧ Jon Collins |
|
2023-08-22 |
NaaS – enterprise networking as an innovation platform |
Network & Edge ‧ Andrew Green |
|
2023-08-21 |
As Microsoft joins the party, is it time to try MDR? |
Security & Risk ‧ Paul Stringfellow |
|
2023-08-11 |
GigaOm Research Bulletin #004 |
Analyst Relations ‧ Jon Collins |
|
2023-08-10 |
What’s the future for WebAssembly? |
Cloud, Infrastructure & Management ‧ Jon Collins |
|
2023-07-28 |
Standalone SOAR is Alive and Kicking |
Security & Risk ‧ Andrew Green |
|
2023-07-27 |
Is there a case for Microsoft as your only enterprise security partner? |
Security & Risk ‧ Paul Stringfellow |
|
2023-07-27 |
Microsoft takes Entra to the edge |
Security & Risk ‧ Paul Stringfellow |
|
2023-07-26 |
How Can CPAs Ethically Interact With ChatGPT? |
Data, Analytics & AI ‧ Elizabeth Kittner |
|
2023-07-21 |
Top Trends from Infosec Europe |
Blog ‧ Paul Stringfellow |
|
2023-07-17 |
Can Open Source save AI? |
Cloud, Infrastructure & Management ‧ Jon Collins |
|
2023-07-14 |
The GigaOm Pivot – rebuilding the analyst business for the digital enterprise |
Leadership ‧ Ben Book |
|
2023-06-17 |
The True Value-Add of Container Networking Solutions |
Network & Edge ‧ Andrew Green |
|
2023-06-09 |
For Sustainability, Buildings and Energy are Strategic Resources |
Cloud, Infrastructure & Management ‧ Kerstin Mende-Stief |
|
2023-06-09 |
MOVEit Transfer hack is right on trend |
Security & Risk ‧ Paul Stringfellow |
|
2023-06-01 |
Themes and Trends at RSA 2023 |
Security & Risk ‧ Howard Holton |
|
2023-05-26 |
GigaOm Research Bulletin #003 |
Analyst Relations ‧ Jon Collins |
|
2023-05-19 |
Elizabeth Pittelkow Kittner, VP of Finance and HR at GigaOm, named as one of the Top 50 Women in Accounting for 2023 |
Featured ‧ Will Mapp |
|
2023-05-19 |
Strengthening the Human Firewall: Security Awareness Training |
Security & Risk ‧ Jamal Bihya |
|
2023-05-17 |
How Would a Distributed SIEM Look? |
Security & Risk ‧ Andrew Green |
|
2023-05-04 |
Touchpoints, coalescence and multi-platform engineering — thoughts from Kubecon 2023 |
Cloud, Infrastructure & Management ‧ Jon Collins |
|
2023-04-24 |
How to Differentiate Between Edge, Cloud, and 5G |
Featured ‧ Andrew Green |
|
2023-03-29 |
Not Your Father’s Primary Storage |
Cloud, Infrastructure & Management ‧ Max Mortillaro |
|
2023-03-28 |
GigaOm Research Bulletin #002 |
Analyst Relations ‧ Jon Collins |
|
2023-03-23 |
CXO Insight: Delivering on Edge Infrastructure |
Network & Edge ‧ Enrico Signoretti |
|
2023-03-20 |
Remembering Michael Delzer |
Analyst Relations ‧ Ben Book |
|
2023-03-18 |
Thinking Strategically About Software Bills of Materials (SBOMs) |
DevOps ‧ Jon Collins |
|
2023-03-14 |
GigaOm Research Bulletin #001 |
Analyst Relations ‧ Jon Collins |
|
2023-03-13 |
How can industry analyst firms work better with early stage startups? |
Analyst Relations ‧ Jon Collins |
|
2023-03-06 |
CXO Insight: Do We Really Need Kubernetes at the Edge? |
Cloud, Infrastructure & Management ‧ Enrico Signoretti |
|
2023-02-27 |
To UEBA or not to UEBA? That is the question |
Featured ‧ Chris Ray |
|
2023-02-22 |
Chairs, towels and GPS devices: where’s the line for analyst event swag? |
Analyst Relations ‧ Jon Collins |
|
2023-02-08 |
will.i.am: ideas people drive tech-first innovation |
People, Processes & Applications ‧ Jon Collins |
|
2022-12-30 |
What do GigaOm analysts see as the big trends in 2023? |
Analyst Relations ‧ Jon Collins |
|
2022-12-22 |
In Software Development, Address Complexity and the Rest Will Follow |
DevOps ‧ Jon Collins |
|
2022-12-22 |
Why DevOps is failing: It’s Not You, It’s The Tools |
DevOps ‧ Jon Collins |
|
2022-12-21 |
A three-point plan for mid-market technology cost saving |
Security & Risk ‧ Howard Holton |
|