Nice to meet you.

Enter your email to receive our weekly G2 Tea newsletter with the hottest marketing news, trends, and expert opinions.

Brandon Summers-Miller

Brandon is a Senior Research Analyst at G2 specializing in security and data privacy. Before joining G2, Brandon worked as a freelance journalist and copywriter focused on food and beverage, LGBTQIA+ culture, and the tech industry. As an analyst, Brandon is committed to helping buyers identify products that protect and secure their data in an increasingly complex digital world. When he isn’t researching, Brandon enjoys hiking, gardening, reading, and writing about food.

Self-Sovereign Identity

What is self-sovereign identity (SSI)? Self-sovereign identity (SSI) is a concept in which an...

Public Key Infrastructure

What is public key infrastructure? Public key infrastructure (PKI) is the architecture that...

Lightweight Directory Access Protocol (LDAP)

What is LDAP? A lightweight directory access protocol (LDAP) is a software protocol available to...

Insider Threat

What is an insider threat? An insider threat originates from within an organization in which an...

DMARC

What is DMARC? DMARC, short for “domain-based message authentication, reporting, and conformance,”...

Transport Layer Security

What is transport layer security? Transport layer security (TLS) is a cryptographic protocol that...

Data Minimization

What is data minimization? Often referred to as data avoidance, data minimization is a process...

Data Exfiltration

What is data exfiltration? Data exfiltration is a type of data theft. Malicious actors breach a...

Data De-Identification

What is data de-identification? Data de-identification is a process enterprises use to interact...

Biometric Authentication

What is biometric authentication? Biometric authentication is a security measure enterprises employ...

Never miss a post.

Subscribe to keep your fingers on the tech pulse.

By submitting this form, you are agreeing to receive marketing communications from G2.