Insight

  • The seventh annual Life and Times of Cybersecurity Professionals study continues to pinpoint many of the same issues as past editions, underscoring persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. Beyond illustrating cybersecurity problems, this year’s edition highlights specific areas where cybersecurity professionals suggest ways their organizations can alleviate the burdens on cybersecurity practitioners while simultaneously bolstering defenses and reducing risks.

    Above all, the report’s most significant revelation is a crisis in cybersecurity leadership as organizations don’t provide adequate support for their cybersecurity programs or the professionals tasked with executing them. This is evident in areas like inadequate training of non-cybersecurity staff, the lack of integration between cybersecurity and other business functions, and ineffective human resources efforts to recruit specialized cybersecurity talent. Overall, the survey findings reveal immense pressures on CISOs and emphasize the urgent need for them to have a stronger voice at the highest levels of their organizations to advocate for necessary changes on each of these fronts.

    This serves as the seventh such research project, dating back to 2016. All references to previous Enterprise Strategy Group and ISSA research in this report can be found in The Life and Times of Cybersecurity Professionals Volume VI.

    To learn more, download the free report, The Life and Times of Cybersecurity Professionals Volume VII.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (April 2024 – September 2024) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM. In this report you will find:

    ·The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.

    ·The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Despite their need for comprehensive cybersecurity programs, midmarket and small enterprise organizations often have limited budgets and resources, which can make attracting skilled personnel challenging for these firms. Gaps in security visibility, policies, processes, and infrastructure plus a tendency to use older systems and software make these organizations more vulnerable to attack than businesses with more mature and better funded cybersecurity cultures. Even with continued successful cyberattacks across industries, midmarket and small enterprise organizations frequently fail to react quickly or sufficiently to threats, accepting risk without understanding the potential impact. Highly dependent on third-party SaaS applications and infrastructure, smaller companies often lack visibility into operational threat signals, resulting in an excessive progression of attacks before discovery.

    To further assess and understand the current state of cybersecurity programs at these smaller organizations, TechTarget’s Enterprise Strategy Group surveyed 379 IT and cybersecurity professionals at midmarket and small enterprise organizations in North America (US and Canada).

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Understanding and applying generative AI (GenAI) requires a deep technical knowledge base, and many organizations struggle to stay abreast of the ever-evolving landscape. Which model is best for our use case? How can we incorporate our own data? How can we get started with responsible AI? Moreover, implementing and scaling GenAI solutions demands substantial computational resources and robust IT infrastructure. These factors coupled with the need to comply with data privacy regulations and AI ethics norms are creating a troubling scenario for organizations that want to leverage this powerful technology but need help getting started and eventually scaling its use within the business.

    The growing partner ecosystem plays a crucial role in supporting GenAI, especially as organizations rapidly ramp up initiatives. Many organizations rely on partners to bridge skill gaps and navigate the intricacies of GenAI development. This collaborative approach not only addresses the need for expertise but also fosters a learning environment, allowing organizations to upskill their teams.

    To gain further insight into these trends and challenges, TechTarget’s Enterprise Strategy Group surveyed 382 professionals at organizations in North America (US and Canada) involved in the strategy, decision-making, selection, deployment, and management of generative AI initiatives and projects at their organization and familiar with their organization’s use of third parties to support generative AI initiatives.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on security needs and preferred strategies for midmarket and small enterprise organizations, including the current state of security program development and the associated gaps and challenges.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on generative AI adoption drivers, capabilities, prioritization, investment, stakeholders, metrics delivery methods, challenges, skills, partner types, and partner engagement and collaboration trends.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Due to the criticality of data to virtually all operations today, data resilience is a major focus for infrastructure and cybersecurity teams alike. One need only look at security incidents at Colonial Pipeline and Change Healthcare to understand the enterprise concern. While many look to third-party tools for help with the important task of data discovery in support of resilience, a significant contingent of organizations prefer internally developed tools. Recent research by TechTarget’s Enterprise Strategy Group found that the decision to use third-party vendor services or internally developed data discovery tools can correlate to organizational priorities and affect data resilience solution adoption.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • While even the best-resourced IT organization can perpetually feel like they need more help on hand to contend with the intense cybersecurity threat landscape, some organizations are solving the situation by deploying third-party tools to supersede internally developed tools. Internal resource constraints are forcing firms to find novel ways of stretching thin pools of expertise and resources to achieve an acceptable cybersecurity posture. When it comes to the critical task of ensuring resilience from attacks or even accidental corruption for precious data assets, recent research by TechTarget’s Enterprise Strategy Group found that organizations lacking skill sets are more likely to deploy commercial tools for data discovery and classification rather than develop and maintain internally developed tools.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Platforms Are Critical for SaaS Security

    Maintaining a strong SaaS security posture that includes the right controls, levels of visibility, and threat detection while accounting for new application types like generative AI is a complex task today. Recent research by TechTarget’s Enterprise Strategy Group suggests that the platform approach is coming to the fore as a preferred strategy for IT teams that need to bring a range of functionality together for the crucial task of securing SaaS applications.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Enterprise Browsers Gain Traction

    Securing access across different types of user device and corporate resources continues to challenge even the most sophisticated IT organizations. Enterprise browsers provide an alternative to strictly network-based solutions by adding security enforcement closest to where many users spend the majority of their time: the browser. Recent research by TechTarget’s Enterprise Strategy Group investigated IT decision-makers’ perspectives on how enterprise browsers fit into their broader network security strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Modernizing Application Security to Scale for Cloud-native Development.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. Traditional application security methods may be disruptive or even slow down development processes. As development teams scale using cloud-native technologies and modernized processes, the higher chance for mistakes creates software vulnerabilities that leave them susceptible to attack. Security teams need a modernized approach to efficiently incorporate security tools and processes across the software development lifecycle while promoting business growth by supporting development as it scales.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 350 IT, cybersecurity, and application development professionals in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.