21 followers 4 artículos/semana
Zero Trust 101: It’s Time to Ditch “Trust but Verify”

Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of cybersecurity, you’re in the right place. Over the next few posts, we’re going to demystify this buzzworthy concept and show you how to make it work for your organization. No jargon, no fluff, just practical insights you can use to enhance...

Fri Jun 7, 2024 23:03
Near, Far, Wherever Your CPUs Are

Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best, but they fail to capture some really important architectural and delivery mechanisms for edge solutions. Some of those include as-a-service consumption versus purchasing hardware, global networks versus local deployments, or suitability for...

Tue Jun 4, 2024 17:33
The Challenge of Securing User Identities

Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many forms, there is a common thread: they all started with a compromise of user identity. Why Identities are Targeted Identity security—whether it involves usernames and passwords, machine names, encryption...

Tue Jun 4, 2024 17:33
Could Network Modeling Replace Observability?

Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based solutions. That changed when Forward Networks and NetBrain requested inclusion in the network observability report. These two vendors have built their products on top of a network modeling technology, and...

Tue Jun 4, 2024 17:33
On Questionnaires and Briefings: Explaining the GigaOm Policy Change

A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are constantly looking to make our research processes more efficient and more effective. Vendors often tell us what it’s like to work with us—we welcome these interactions and look to address every comment (so thank you for these!). We spent a...

Tue May 21, 2024 23:58
Everything Your Parents Told You About Posture Is True! Even For Data Security

Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up. For those who did sit up straight and find themselves in positions of influence when it comes to IT, they are still hearing about the importance of posture, but in this case, it’s the importance of security posture. Data security...

Sat May 18, 2024 00:45

Crea tu propio feed de noticias

¿Listo para probarlo?
Comienza una prueba de 14 días, no es necesaria tarjeta de crédito.

Crear cuenta