Cyberthreat intelligence (CTI) is the collection, normalization, analysis, and sharing of information and data regarding vulnerabilities and breaches, leading to actionable…
Read MoreResearch
GigaOm Radar for Penetration Testing as a Service (PTaaS)
Penetration testing, a cornerstone of cybersecurity, has for many years been the go-to technique for security professionals looking to uncover vulnerabilities…
Read MoreGigaOm Research Bulletin #005
Welcome to GigaOm’s research bulletin for November 2023 Hi, and welcome back! GigaOm’s partnership with Ingram Micro clearly shows how we…
Read MoreGigaOm Radar for Autonomous Security Operations Center (SOC)
Autonomous security operations center (SOC) solutions reallocate security analysts’ processing power from conducting repetitive analysis and response tasks to only investigating…
Read MoreGigaOm Radar for Ransomware Prevention
Ransomware continues to be a high-priority threat for all organizations, regardless of size. As with all cybersecurity challenges, the threat continues…
Read MoreKey Criteria for Evaluating Cloud Network Security Solutions
Cloud network security solutions provide a suite of security services for single and multicloud environments to prevent unauthorized traffic, access, modification,…
Read MoreKey Criteria for Evaluating Penetration Testing as a Service (PTaaS) Solutions
Penetration testing, a cornerstone in cybersecurity, has for many years been the go-to technique for security professionals looking to uncover vulnerabilities…
Read MoreSIEM and SOAR – Will They or Won’t They?
A considerable percentage of SIEM vendors share a vision for how to help security operations centers deal with the high volume…
Read MoreKey Criteria for Evaluating Ransomware Prevention Solutions
Ransomware continues to be a high-priority threat for all organizations, regardless of size. As with all cybersecurity challenges, the threat continues…
Read MoreKey Criteria for Evaluating Threat Intelligence Platforms (TIPs)
Cyber threat intelligence (CTI) encompasses the collection, processing, analysis, and distribution of threat data, culminating in actionable insights. These insights facilitate…
Read MoreGigaOm Radar for Multifactor Authentication (MFA)
Multifactor authentication (MFA) is a credential verification method that requires the provisioning of two or more verification factors to gain access…
Read MoreKey Criteria for Evaluating Autonomous Security Operations Center (SOC) Solutions
Autonomous security operations center (SOC) solutions converge security information and event management (SIEM) and security orchestration, automation, and response (SOAR) capabilities…
Read More