Cybersecurity & Networking

  • Identity Needs a Seat at the Cybersecurity Table

    Identity is rooted in IT operations. In fact, when most people think of identity, they think of access management, as in identity and access management, or IAM.

    The shift to the cloud and remote work, combined with the rise of phishing and other identity-related attacks, puts identity security at the forefront of cybersecurity concerns.

    Read my blog to learn more about identity’s relationship to cybersecurity.

  • Securing the API Attack Surface

    Research Objectives

    • Validate API usage and growth patterns associated with cloud adoption and digital transformation.
    • Highlight the challenges security teams are facing in securing their APIs.
    • Examine current API security approaches and their effectiveness.
    • Determine best practices for improving API security.
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2023 SASE Series: SSE Leads the Way Toward SASE

    Research Objectives

    • Identify top drivers for SASE and SSE initiatives and whether they are changing.
    • Understand the primary technologies and capabilities users are seeking in SSE solutions.
    • Determine if companies are making progress with organizational changes to support network and cybersecurity convergence.
    • Monitor interest in single-vendor solutions and anticipated project timelines. (more…)
  • Securing the API Attack Surface

    Organizations across industries need effective API security solutions to reduce cybersecurity risk as cloud-native development scales. This can help their teams discover, manage, configure, monitor, and protect their APIs to keep pace with modern software development.

    Learn more about these trends with the infographic, Securing the API Attack Surface.

  • According to The Life and Times of Cybersecurity Professionals Volume VI (2023), the cybersecurity skills shortage continues unabated, leaving a majority of organizations with an ever-growing gap in the cybersecurity skills needed to reduce their cyber-risk from the latest threats. As the void widens, cybersecurity professionals bear the brunt: More than half find their jobs harder than two years ago, with many facing ongoing internal issues and new external challenges from an increase in cybersecurity complexity to a surge in cyber-attacks against an expanding attack surface. Chronic understaffing remains a major contributor to these issues and associated ramifications, with roughly one out of five professionals having even considered making a career switch, mainly out of frustration with what they perceive as organizational neglect and the sheer stress of their jobs.

    (more…)

  • Research Objectives

    • Assess the career progression of cybersecurity professionals.
    • Determine whether cybersecurity professionals are satisfied with their careers and current jobs.
    • Measure the impact of the global cybersecurity skills shortage and uncover what organizations are doing in response.
    • Monitor cybersecurity leadership stat

  • Securing the API Attack Surface

    Research Objectives

    Organizations across industries improve their productivity, innovation, and customer service with an increase in web, mobile, and cloud applications leveraging microservices architectures. But this brings an increase in APIs connecting application components and resources. Organizations rate APIs as the element in the cloud-native stack most susceptible to attack, and attacks stemming from insecure APIs were the most commonly identified cybersecurity incident tied to cloud-native app development over the last 12 months. As the number of APIs continues to grow, security risk increases.

    As a result, organizations need effective API security solutions to reduce risk as cloud-native development scales and help their teams discover, manage, configure, monitor, and protect their APIs to keep pace with modern software development. To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 397 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and managing API security solutions.

    This study sought to answer the following questions:

    • Approximately what percentage of public-facing web applications are based on a microservices, cloud-native architecture today? How is this expected to change, if at all, over the next 24 months?
    • How frequently do organizations’ developers (and/or DevOps teams) deliver new software builds to production? How is this expected this change, if at all, over the next 6 to 12 months?
    • What security challenges do organizations face with the faster development cycles of CI/CD?
    • What is the average number of APIs per application? What proportion of cloud-native applications use APIs today? How is that expected to change, if at all, over the next 24 months?
    • Have organizations experienced a security incident related to insecure APIs in the last 12 months? What type of security incident(s) did organizations suffer as a result of insecure APIs?
    • What are the biggest challenges organizations have faced with API security? What types of API vulnerabilities are of greatest concern?
    • How long does it typically take for organizations to remediate an API vulnerability? How do organizations ensure APIs do not expose sensitive data?
    • How would organizations describe the collective level of understanding their development teams have of security risks for APIs?
    • Do organizations provide formal API security training to their development teams?
    • When new APIs are published, when does the team responsible for securing them become involved?
    • What is the source from which API security is funded, or will likely be funded? Do organizations expect to increase their spending on API security technologies, services, and personnel over the next 12-18 months?
    • What do organizations expect to increase their API security spending on the most over the next 12-18 months?
    • What actions do organizations expect to take over the next 12-18 months to implement or optimize their web application and API protection strategies?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    (more…)

  • The Appeal of Cloud-based Network Management

    With modern IT environments comprising distributed applications across private data centers, public clouds, and edge locations, plus support for hybrid employees working outside of traditional office settings, networking professionals have plenty of choices to make as they ensure critical connectivity for their businesses. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to these decisions makers’ preferences for cloud-based network management versus on-premises-based strategies.

    (more…)

  • In networking, a digital twin is a virtual representation of an organization’s actual network environment that IT teams can use as a virtual test bed to assist in planning changes or upgrades to the environment. TechTarget’s Enterprise Strategy Group recently looked into how familiar organizations are with these solutions, how important they are perceived to be, and what current levels of interest are in terms of applying digital twin technology to the networking space.

    (more…)

  • As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. Unfortunately, these new collaboration tools provide attackers the opportunity to engage with humans and evade automated cybersecurity controls.

    Learn more about these trends with the infographic, Challenges in Securing an Overabundance of Communication and Collaboration Tools.

  • Research Objectives

    • Assess how organizations approach security hygiene and posture management today.
    • Understand coverage gaps, why these gaps exist, and whether these gaps lead to security incidents.
    • Evaluate how organizations test the efficacy of their security controls and what this testing accomplishes.
    • Highlight what cybersecurity professionals believe their organizations should do to improve security hygiene and posture management.
    • (more…)
  • Research Objectives

    As more workers collaborate virtually, many organizations now depend on additional digital communication tools beyond email. New collaboration tools provide attackers the opportunity to engage with humans to evade automated controls, extending phishing, BEC, credential theft, and other socially engineered attacks beyond email. Advanced attacks leverage multiple attack vectors, requiring individual, core security controls to work together to detect and prevent advanced attacks. This extends beyond traditional security operations tools (e.g., SIEM, SOAR, EDR, and XDR) to core network, cloud, endpoint, and identity controls.

    As IT and security teams focus on risk-driven security strategies, consistency of policies and priorities across all enterprise communication channels becomes critical to strengthening security posture. More education is needed to motivate security architects to embrace this higher-level perspective. To gain further insight into these trends, TechTarget’s Enterprise Strategy Group (ESG) surveyed 490 IT and cybersecurity professionals at organizations in North America (US and Canada) and Western Europe (UK, France, and Germany) involved with securing enterprise communication and collaboration technology and processes.

    In terms of the risk and security of the many electronic communication and collaboration tools in use, this study sought to answer:

    • What types of communication and collaboration tools have organizations formally sanctioned for their employees’ use?
    • Approximately how many disparate communication and collaboration tools, including email, have organizations formally sanctioned for use?
    • Do organizations formally plan to consolidate one or more communication and collaboration tools into a common platform over the next 12 months? What is the primary driver for this consolidation of communication and collaboration tools?
    • How frequently do organizations estimate they face socially engineered attacks involving multiple electronic communication mechanisms, including email, messaging, mobile, and social media? Which communication and collaboration mechanisms do organizations believe are most vulnerable to threat actors?
    • How concerned are organizations that attacks will leverage, or have already leveraged, communication and collaboration tools (both sanctioned and unsanctioned) to evade security controls?
    • What types of threats that leverage communication and collaboration mechanisms (i.e., email, messaging, social media, etc.) are organizations most concerned about? What threats do organizations believe have penetrated their current communication and collaboration security controls in the past 12 months?
    • How much of a priority is securing the many communication and collaboration mechanisms for organizations beyond their primary email solution? How do organizations expect their spending for communication and collaboration security controls to change over the next 12 months?
    • How confident are organizations in the native security capabilities included in each of the formally sanctioned communication and collaboration tools they currently use?
    • Do organizations have a formal security end-user training program that informs employees about securing sensitive information policies?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

    (more…)