Security Technology & Operations

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.

ManageEngine Is Quietly Rebuilding the Enterprise IT Control Plane

Rajesh Ganeshan didn’t walk on stage at the recent ZohoDay (February 2026) to announce a new product or declare a category shift. He spent the time doing something more...

Palo Alto Networks Completes CyberArk Deal, Expanding Zero Trust to Machine Identity

Palo Alto Networks’ acquisition of CyberArk is one of the most strategically important cybersecurity moves of the AI era. This is more than portfolio expansion. It’s a bid...

Assess Readiness and Value for Policy-as-Code

Policy-as-code (PaC) offers a path to codifying and automatically evaluating policies for enforcement but blindly rushing to adoption carries its own risks. This research...

Threat Landscape Briefing – February 2026

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Assess Readiness and Value for Policy-as-Code Storyboard

A practical framework to help you assess the potential of automated policy management and enforcement in your organization.

Policy-as-Code Value & Readiness Assessment Tool

An Excel-based workbook to identify your organization’s unique PaC context.

CyberArk Positions Machine Identity Security as its 2026 Growth Engine

CyberArk is anchoring its 2026 growth strategy on machine identity security, elevating PKI, CLM, and AI agent governance while positioning identity as the foundational...

Device-First Continuum AI: The Technology Behind mimik's Approach

mimik is the first company we've encountered that discusses how to operationalize billions of agents to perform tasks in the physical world, not only within software...

Threat Landscape Briefing – January 2026

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us