pro-report

Want to know more about a cybersecurity product or market space in an easy-to-digest report you can read in 5 minutes? Read the only independent research focused on the cybersecurity market from both a vendor and operator perspective.

How do you keep your data on lock?

CMI #11 - Data Loss Prevention (DLP)
Members Public

Businesses run on sensitive data. Protecting and limiting the loss or misuse of that data is an ever-evolving challenge.

Mike P
Mike P
pro-report

Security, Funded - August 2021 Roll-up
Members Public

The August 2021 roll-up of the "Security, Funded" newsletter from Return on Security.

Mike P
Mike P
pro-report

Security, Funded. - July 2021 Roll-up
Members Public

The July 2021 roll-up of the "Security, Funded." newsletter from Return on Security.

Mike P
Mike P
pro-report
CMI #10 - Deception Technologies

CMI #10 - Deception Technologies
Members Public

The best offense is a good defense. Purposefully misleading or deceiving would-be attackers with traps and decoys is a way to have a canary in the coal mine.

Mike P
Mike P
pro-report
CMI #9 - Breach & Attack Simulation

CMI #9 - Breach & Attack Simulation
Members Public

Security is point-in-time. It’s not a matter of if you get hacked, but when. Why not simulate hacking yourself to get better at attack detection and response?

Mike P
Mike P
pro-report
CMI #8 - Data Access Governance

CMI #8 - Data Access Governance
Members Public

Data is the currency of business, and as trends in privacy and cybersecurity grow, it becomes increasingly important to govern access to that data.

Mike P
Mike P
pro-report
CMI #7 - API Security

CMI #7 - API Security
Members Public

APIs are everywhere. They are a critical part of modern mobile, SaaS, and web applications. They make up peer-to-peer networks and are how the Internet of things (IoT) functions. Let's unpack the cybersecurity vendor and landscape around APIs.

Mike P
Mike P
pro-report
CMI #6 - Endpoint Detection and Response (EDR)

CMI #6 - Endpoint Detection and Response (EDR)
Members Public

Few frontiers in cybersecurity are as highly attacked and as highly defended as the computers and mobile devices we use in everyday life (like the one you’re on now). Let’s unpack the Endpoint Detection and Response (EDR) space and all it entails.

Mike P
Mike P
pro-report