Cybersecurity

  • Improving Incident Response Posture

    Many organizations are struggling to operationalize incident response (IR) against a backdrop of expanding attack surfaces and a growing number of successful attacks. Recent research by TechTarget’s Enterprise Strategy Group revealed that challenges abound in these endeavors, with internal IR leadership and external service providers taking on nuanced roles in the process.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 XDR and SOC Modernization Trends

    This Complete Survey Results presentation focuses on the people, processes, and technology supporting security operations modernization, including key requirements and expectations for both managed services and products serving XDR usage and SOC modernization.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Many organizations are worried about having a high percentage of code that is open source within their software, expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used open source software. Organizations are challenged with increased vulnerability across the software supply chain and need effective security solutions that can support the demands of cloud-native development. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals responsible for evaluating, purchasing, and utilizing developer-focused security products to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Growing Complexity of Securing the Software Supply Chain.

  • Software is increasingly composed of open source software (OSS), with the majority of organizations reporting it constitutes more than half of their code composition. While it saves time for developers when they can utilize existing third-party code to build and run their applications, security teams need to understand the software components to put the processes in place to secure the applications.

    Consequently, many organizations are worried about having a high percentage of code that is open source, with some expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used OSS. Organizations are challenged with increased vulnerability across the software supply chain and with understanding how to effectively mitigate risk in light of recent targeted attacks. Organizations need effective software supply chain security solutions that can support the demands of cloud-native development.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 368 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Operationalizing Encryption and Key Management

    The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. As a result, organizations are turning to encryption and future-proofed post-quantum encryption to maintain cyber resilience as well as to ensure data privacy and compliance.

    To learn more about these trends, download the free infographic, Operationalizing Encryption and Key Management.

  • Generative AI (GenAI) introduces new risks as employees connect to GenAI applications, share data, and build homegrown large language models. Security professionals are also anxious about how cybercriminals may use GenAI as part of attack campaigns. Despite these risks, generative AI holds great cybersecurity-boosting potential as well.

    To learn more about these trends, download the free infographic, Generative AI for Cybersecurity: An Optimistic but Uncertain Future.

  • This Complete Survey Results presentation focuses on securing the software supply chain, including the implications of using open source software (OSS), the types of software supply chain attacks organizations have experienced, and the types of security solutions in place to defend against or help mitigate these attacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Since the introduction of ChatGPT in November 2022, generative AI (GenAI) has been described as everything from a novelty and an economic boon to a threat to humanity. As this debate continued, GenAI took center stage at the RSA Conference 2023 with the introduction of and subsequent hoopla around Microsoft Security Copilot. Many other vendors have introduced similar capabilities since. Few would argue against the idea that GenAI (and AI in general) will have a profound impact on society and global economics, but in the near term, it introduces new risks as employees connect to GenAI applications, share data, and build homegrown large language models (LLMs) of their own. These actions will inevitably expand the attack surface, open new threat vectors, introduce software vulnerabilities, and lead to data leakage.

    Despite these risks, generative AI holds great cybersecurity potential. Generative AI could help improve security team productivity, accelerate threat detection, automate remediation actions, and guide incident response. These prospective benefits are so compelling that many CISOs are already experimenting with GenAI or building their own security LLMs. At the same time, security professionals remain anxious about how cybercriminals may use GenAI as part of attack campaigns and how they can defend against these advances.

    Have organizations embraced GenAI for cybersecurity today, and what will they do in the future? To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 370 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for cyber-risk management, threat intelligence analysis, and security operations, with visibility into current GenAI usage and strategic plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on how generative AI is helping frequently understaffed cybersecurity teams to analyze and prioritize decisions to mitigate cyber-risk as well as how adept cyber-defenders are at tracking AI-based threats and implementing the right countermeasures.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Operationalizing Encryption and Key Management

    The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. Additionally, ransomware actors are changing their tactics to focus on data extortion: holding exfiltrated data hostage to public exposure.

    As a result, organizations are turning to encryption to maintain cyber resilience in response to a successful data breach as well as to ensure data privacy and compliance. Although organizations understand how encryption protects data, they struggle with the implementation, specifically how encryption and key management solutions balance security, usability, performance, compatibility, and costs. Further compounding these problems is quantum computing’s potential to break current encryption capabilities, representing another challenge to securing sensitive data. Vendors need to demystify and simplify encryption and key management.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 387 IT, cybersecurity, compliance, and DevOps professionals at organizations in North America (US and Canada) involved with encryption and data security technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from almost 700 global technology buyers of which 385 were Sr. IT or Business Leadership. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • EMEA Tech Buyers Media Consumption Habits in 2024

    TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from 240 EMEA technology buyers across IT management and senior business roles. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.