Insight

  • A promising new crop of vendors has sprouted up to address application security posture management (ASPM). While new research from TechTarget’s Enterprise Strategy Group on modern application security trends revealed challenges streamlining remediation efforts to reduce cybersecurity incidents and their effects that an ASPM might able to address, it is a newly emerging area that needs to be better defined to help orchestrate better security processes and tools throughout the software development lifecycle.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As modern applications are often no longer tied to their underlying infrastructure, consist of numerous loosely coupled microservices, and can rapidly move and scale, corporate IT needs urgent help to understand and prioritize the potential impact of the yellow and red lights on their monitoring dashboards. This is where observability must come in, in place of traditional monitoring, to save the day. While monitoring is a mostly static discipline based on the collection of predefined metrics and logs—often separate from applications, infrastructure, and services to detect anomalies or failures—observability provides deeper insights into the key factors influencing application performance and resilience.

    To learn more, download the free brief, LogicMonitor Brings Foundation for High Impact AI to Hybrid Observability.

  • The Need for Effective Secrets Management

    As modern application development processes enable teams to increase productivity and scale, effective secrets management plays a crucial role. Research from TechTarget’s Enterprise Strategy Group showed that security, application development, and infrastructure teams are challenged with secrets management—the processes and tools used to securely store, manage, and access sensitive credential information such as passwords, API keys, digital certificates, and encryption keys—and need an effective strategy to mitigate risk.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Understanding and applying generative AI (GenAI) requires a deep technical knowledge base, substantial computational resources, robust IT infrastructure, and even compliance with data privacy regulations and AI ethics norms. Many organizations struggle to stay abreast of this ever-evolving landscape. The growing partner ecosystem plays a crucial role in supporting GenAI, with many organizations relying on partners to bridge skill gaps and navigate the intricacies of development. TechTarget’s Enterprise Strategy Group recently surveyed professionals involved in GenAI initiatives and projects at their organization and familiar with their organization’s use of third parties to support GenAI initiatives to gain insights into these trends.

    To learn more about these trends, download the free infographic, Navigating the Generative AI Partner and Alliance Landscape.

  • Evolution of Digital Experience Platforms

  • GenAI in IT Application Development

  • Private 5G: Inside the Progress and Opportunity

  • Securing SaaS Ecosystems

  • Impact of GenAI on Customer Service

  • Cybersecurity professionals contend with persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. There is also a crisis in cybersecurity leadership, as organizations don’t provide adequate support for their cybersecurity programs or the professionals tasked with executing them. Overall, CISOs are under immense pressure and urgently need to have a stronger voice at the highest levels of their organizations to advocate for necessary changes. TechTarget’s Enterprise Strategy Group together with ISSA recently surveyed IT and cybersecurity professionals across the globe to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Life and Times of Cybersecurity Professionals Volume VII.

  • The seventh annual Life and Times of Cybersecurity Professionals study continues to pinpoint many of the same issues as past editions, underscoring persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. Beyond illustrating cybersecurity problems, this year’s edition highlights specific areas where cybersecurity professionals suggest ways their organizations can alleviate the burdens on cybersecurity practitioners while simultaneously bolstering defenses and reducing risks.

    Above all, the report’s most significant revelation is a crisis in cybersecurity leadership as organizations don’t provide adequate support for their cybersecurity programs or the professionals tasked with executing them. This is evident in areas like inadequate training of non-cybersecurity staff, the lack of integration between cybersecurity and other business functions, and ineffective human resources efforts to recruit specialized cybersecurity talent. Overall, the survey findings reveal immense pressures on CISOs and emphasize the urgent need for them to have a stronger voice at the highest levels of their organizations to advocate for necessary changes on each of these fronts.

    This serves as the seventh such research project, dating back to 2016. All references to previous Enterprise Strategy Group and ISSA research in this report can be found in The Life and Times of Cybersecurity Professionals Volume VI.

    To learn more, download the free report, The Life and Times of Cybersecurity Professionals Volume VII.