Nice to meet you.

Enter your email to receive our weekly G2 Tea newsletter with the hottest marketing news, trends, and expert opinions.

Aaron Walker

Aaron has been researching security, cloud, and emerging technologies with G2 for more than half a decade. Over that time he's outlined, defined, and maintained a large portion of G2's taxonomy related to cybersecurity, infrastructure, development, and IT management markets. Aaron utilizes his relationships with vendors, subject-matter expertise, and familiarity with G2 data to help buyers and businesses better understand emerging challenges, solutions, and technologies. In his free time, Aaron enjoys photography, design, Chicago sports and lizards.


Tools and Tips for Keeping your Small Business Secure

Cybersecurity has become a requirement for most businesses, but there’s no true silver bullet to...


Cybersecurity Trends 2019 Update: Blockchain and AI

This year hasn’t given way to as many cybersecurity headlines as 2017 did. But threats haven’t gone...


11 Best Free Backup Software for 2019

Backup software is an essential component of a reliable business continuity plan. It can help save...


What is PaaS? A Beginner's Guide to Platform as a Service

Companies use PaaS solutions to build, deploy, and maintain applications. These tools can be...


The State of B2B Tech in Asia in 2018

We have compiled data on the state of tech in Asia and the entire continent’s B2B tech scene.


The United States of Software: American Software Companies

We have compiled data on the state of the American Software Companies and the USA’s B2B tech scene.


Blockchain Security: Trends, Predictions, and the Future

Bitcoin is booming, but blockchain is evolving. Bitcoin is always a point of reference for...


Cybersecurity Trends: 4 Biggest Security Threats for Businesses

In 2017 we witnessed some of the largest cyberattacks in history. Giant companies like Equifax,...


Risk-Based Authentication: The Future of Workplace Security

Risk-based authentication software(RBA), sometimes called adaptive authentication, is an emerging...

Never miss a post.

Subscribe to keep your fingers on the tech pulse.

By submitting this form, you are agreeing to receive marketing communications from G2.