
It’s more important than ever to accurately assess underappreciated risk and threat vectors and to identify effective and efficient ways to address them.
Our latest research shows the average number of planned investments in Cybersecurity technology tops all other tech categories we studied.
We work closely with vendors and end users alike to stay up to date on how organizations are investing, what problems they’re trying to solve, and how the market is changing or adapting to the latest trends. Enterprise Strategy Group’s Cybersecurity analysts and research cover every aspect of an organization’s cybersecurity needs and lifecycle, including:
- Application security
- Cloud security
- Cyber risk management
- Data security
- Identity & access management
- Network security
- Security operations
- Threat detection & response
- User protection
Research Report
The Life and Times of Cybersecurity Professionals Volume VII
The seventh annual Life and Times of Cybersecurity Professionals study continues to pinpoint many of the same issues as past editions, underscoring persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. Beyond illustrating cybersecurity problems, this year’s edition highlights specific areas where cybersecurity […]
Analysts Covering Cybersecurity

John Grady
Principal Analyst, Network Security & Web Application Security
Areas of Expertise
- Bot Mitigation
- CASB
- DDoS
- Firewall
- IPS
- Microsegmentation

Dave Gruber
Principal Analyst, Ransomware, SecOps & Services
Areas of Expertise
- All Things Security Operations
- Leveraging AI in SecOps
- Managed Detection & Response
- MidMarket Cybersecurity Strategies
- Ransomware Security Strategies
- Security Analytics

Gabe Knuth
Senior Analyst, End-user Computing & User Protection
Areas of Expertise
- Desktop & App Virtualization (VDI)
- Desktop-as-a-Service (DaaS)
- Digital Employee Experience (DEX)
- Digital Workspaces
- Email Security
- End-User Devices & Hardware

Melinda Marks
Practice Director, Cybersecurity
Areas of Expertise
- API Security
- Application Security
- Cloud Security Posture Management
- Cloud Workload Protection Platforms
- Cloud-native Technologies
- Container Security

Tyler Shields
Principal Analyst, Risk & Vulnerability Management
Areas of Expertise
- API Security
- Application Security Posture Management
- Attack Surface Risk Management
- GRC/Compliance
- Offensive Security Technologies
- Pen Testing Services

Aaron Tan
Regional Director, Analyst Services, APAC
Areas of Expertise
- Application Modernization & DevOps
- Business Applications
- Cloud Computing
- Cybersecurity
- DevOps
- IaaS/Cloud

Todd Thiemann
Senior Analyst, IAM & Data Security
Areas of Expertise
- AI & ML in Cybersecurity
- Data Loss Prevention
- Data Security Posture Management
- Encryption & Key Management
- Identity & Access Management (IAM)
- Identity Security Posture Management (ISPM)
Recent Cybersecurity Insights
Research Brief | January 29, 2025
Non-human Identity Compromise Is Common and Getting Board-level Attention
Research Brief | January 29, 2025
Enterprises Recognize Non-human Identities Are Insufficiently Secured
Research Report | January 27, 2025
Q4 2024 Activity Trends: What’s Driving Growth Across the Informa TechTarget & BrightTALK Network
Infographic | January 9, 2025