Cybersecurity

  • Today’s CISOs are asked to juggle business risk with security oversight across increasingly complex hybrid IT architectures in a state of constant change. Recent research by TechTarget’s Enterprise Strategy Group and the Information Systems Security Association (ISSA) reveals that this balancing act is getting increasingly difficult as CISOs strive to maintain business operations, keep their organizations safe, and mind their own career goals along the way.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Incident Response Strategies in the Spotlight

    Ransomware, business email compromise, and other attacks are increasingly evading cybersecurity defenses, causing IT and cybersecurity teams to further invest in incident response (IR) readiness. As such, incident response can no longer be viewed as an event-driven action but must be operationalized and become a core strategy within security operations. As security and line-of-business teams react to this new reality, new incident response strategies are needed for most.

    Few have the internal resources and capacity to handle this key function on their own, requiring many to leverage a service-based approach. While managed security service providers and managed detection and response service providers have become commonplace, a deeper partnership is needed to enable real-time IR services capable of mitigating damage from successful attacks. Cybersecurity leaders need to better understand the differentiation of IR services as a standalone offering versus those included in a broader set of service offerings to make more informed decisions.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 339 IT and cybersecurity professionals at organizations in North America (US and Canada) involved with incident response technologies and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations across industries are feeling the same pain from password-based authentication: Frustrated users can’t use easy-to-remember passwords because they’re easy to crack, and they struggle to use strong passwords without reusing them or resorting to other unsecure methods of recalling them. Research conducted by TechTarget’s Enterprise Strategy Group explored the use of Fast Identity Online (FIDO) to eliminate the use of passwords for securing access to enterprise systems.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Password-based authentication has proved itself insufficient in securing access to organizational resources in the face of the modern threat landscape. Recent research by TechTarget’s Enterprise Strategy Group revealed that although the use of multifactor authentication (MFA) strengthens security, it can add friction to the authentication process, and organizations are turning to adaptive MFA to balance security with a reasonable user experience.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Technology Spending Intentions Survey

    This Complete Survey Results presentation focuses on 2024 IT budget expectations, technology initiatives and priorities, year-over-year spending changes (overall and by different technologies), cloud usage trends, and how digital transformation initiatives intersect with these considerations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Incident Response Strategies in the Spotlight

    This Complete Survey Results presentation focuses on assessing the state of incident response (IR) strategies and readiness activities, including how organizations measure readiness, and highlights notable gaps and challenges organizations are struggling with as they strengthen IR readiness initiatives.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cloud Detection and Response

    Increasingly dynamic cloud environments are presenting visibility challenges for security. Indeed, the majority of organizations claim that lack of access to physical networks, the dynamic nature of cloud-native applications, and elastic cloud infrastructure create blind spots, making security monitoring challenging. SOC teams need to address this cloud visibility gap by collecting, processing, monitoring, and acting upon information from an assortment of cloud security telemetry sources.

    Additionally, nearly all organizations experienced a cloud security incident in the last year, resulting in application downtime, unauthorized access, data loss, and compliance fines. Thus, cloud security limitations can impact the business. Understanding this risk, executives and corporate boards are demanding measurable progress. Given the rise of digital transformation and cloud-native software development, CISOs must align threat detection and response spending with an increasing array of cloud-based business-critical workloads.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 393 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for evaluating or purchasing cloud security technology products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Ransomware Preparedness

    Ransomware is widely considered a critical and existential threat to the viability of any business. Given the high frequency of attacks and the impacts of successful ones such as data and infrastructure loss, many organizations are left with damages that have an effect well beyond IT. Attackers often go beyond valuable data assets by undermining key infrastructure components and exposing significant gaps, including those in the backup infrastructure itself. IT leaders must understand that the nature of the threat goes well beyond just data and focus on protecting and further leveraging their backup and recovery infrastructure to remove risk and minimize business impact through advanced capabilities. Overall, most organizations should consider key features to improve their cyber-resilience as they continue to battle ransomware and other cyber-risks.

    In order to gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 600 IT and cybersecurity professionals at organizations in North America (US and Canada) and Western Europe (UK, France, and Germany) personally involved with the technology and processes associated with protecting against ransomware. The research results were further used to create a multidimensional model to evaluate organizations’ progress over the last 18 months in preparing for these threats and identifying best practices.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. New this year! Buyer perceptions on AI-generated content.​

    This report focuses on responses from 600+ global technology buyers in across IT management and senior business roles.​

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations are excited by the promise of AI, but they frequently find themselves lacking the in-house expertise and resources needed to fully harness AI’s potential. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to what these organizations expect from AI vendors and the broader AI partner ecosystem.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Cloud Detection and Response

    This Complete Survey Results presentation focuses on the challenges security teams face resulting from threats to cloud workloads, identities, and application development processes, as well as the state of cloud detection and response skills, processes, and technologies.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Passwordless in the Enterprise

    This Complete Survey Results presentation focuses on top authentication challenges, including cyber-attacks; user experiences and attitudes toward modern authentication; and organizational desires to address authentication challenges with phishing-resistant passwordless authentication.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.