Welcome to our new blog series on zero trust! If you’re an IT executive trying to navigate the complex world of cybersecurity, you’re in the right place. Over the next few posts, we’re going to demystify this buzzworthy concept and show you how to make it work for your organization. No jargon, no fluff, just practical insights you can use to enhance...
Over the past two years, I’ve been making the point that near edge and far edge are utilitarian terms at best, but they fail to capture some really important architectural and delivery mechanisms for edge solutions. Some of those include as-a-service consumption versus purchasing hardware, global networks versus local deployments, or suitability for...
Several businesses I’ve worked with recently have had the misfortune of being victims of cybersecurity incidents. While these incidents come in many forms, there is a common thread: they all started with a compromise of user identity. Why Identities are Targeted Identity security—whether it involves usernames and passwords, machine names, encryption...
Over the past four years, I’ve consolidated a representative list of network observability vendors, but have not yet considered any modeling-based solutions. That changed when Forward Networks and NetBrain requested inclusion in the network observability report. These two vendors have built their products on top of a network modeling technology, and...
A stitch in time saves nine, they say, and so can receiving information in the right order. We at GigaOm are constantly looking to make our research processes more efficient and more effective. Vendors often tell us what it’s like to work with us—we welcome these interactions and look to address every comment (so thank you for these!). We spent a...
Sit up straight! Shoulders back, chest out! We all heard these wise words about the importance of physical posture growing up. For those who did sit up straight and find themselves in positions of influence when it comes to IT, they are still hearing about the importance of posture, but in this case, it’s the importance of security posture. Data security...
Crea tu propio feed de noticias
¿Listo para probarlo?
Comienza una prueba de 14 días, no es necesaria tarjeta de crédito.