Cybersecurity

  • Organizations are increasingly leveraging microservices-based applications, which require APIs to access services, data, or other applications. Recent research by TechTarget’s Enterprise Strategy Group reveals that these trends make API security a critical aspect of any modern application security program.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Security hygiene and posture management, though fundamental to any cybersecurity strategy, remains a moving target at many organizations today as they contend with sprawling tools and users as well as constantly changing mandates to enable the business. Recent research by TechTarget’s Enterprise Strategy Group shows that these tasks may be especially challenging for organizations that have been in operation for 20 years or more.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The recent increase in APIs connecting application components and resources, brought on by organizations leveraging microservices architectures, has improved myriad operations and customer service motions. However, recent research by TechTarget’s Enterprise Strategy Group shows that commensurate cybersecurity risks can only be addressed by teams working together across organizational silos.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • In an intensely competitive business climate, IT teams are tasked with supporting employee productivity with both device and work-location choice, leading to a sprawling attack surface, cloud use, and digital transformation mandates at every turn. Recent research by TechTarget’s Enterprise Strategy Group revealed important drivers of security hygiene and posture management against this backdrop, and how teams are contending with the work at hand.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Organizations have been broadly and enthusiastically adopting initiatives involving artificial intelligence, and the maturity of those initiatives within business operations is on the rise. Recent research by TechTarget’s Enterprise Strategy Group found two key drivers of these trends: anxieties that businesses will miss out on the advantages of generative AI (GenAI) and the increasing focus of vendors and partners on simplifying their products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As cyber-attacks continue unabated, the global population depends upon cybersecurity professionals to protect them from a global army of state-sponsored actors, cyber-criminals, hacktivists, and script kiddies alike. Unfortunately, cybersecurity teams are often understaffed, lacking advanced skills, and working in an environment of constant pressure. To gain further insight into these trends, TechTarget’s Enterprise Strategy Group and the Information Systems Security Association (ISSA) surveyed 301 IT and cybersecurity professionals at organizations all over the world.

    This study sought to answer the following questions:

    • Why has working as a cybersecurity professional become more difficult today than it was two years ago?
    • How satisfied are cybersecurity professionals at their current jobs? What are the biggest factors for determining their level of job satisfaction?
    • How likely are cybersecurity professionals to leave their current job in 2023 for any reason, including retirement, career change, and leaving for another cybersecurity job?
    • How do cybersecurity professionals characterize the stress level typically associated with their careers?
    • What are the most stressful aspects of jobs/careers as a cybersecurity professional?
    • What actions do cybersecurity professionals believe would be the most helpful for the advancement of their careers?
    • How would cybersecurity professionals characterize the cybersecurity culture at their organization?
    • At any time in their career, have cybersecurity professionals experienced a situation in which the organization they worked for was knowingly ignoring security best practices and/or regulatory compliance requirements? If put in that situation, would these cybersecurity professionals be willing to act as whistleblowers?
    • How has the global cybersecurity skills shortage impacted cybersecurity professionals’ organizations? How do they think that has changed over the last two years?
    • What actions do cybersecurity professionals believe could be taken to address the impact of the cybersecurity skills shortage?
    • How difficult is it for organizations to recruit and hire cybersecurity professionals?
    • Do organizations have a chief information security officer (CISO), or similar position, in place today? To whom does the CISO report? What do cybersecurity professionals believe is the most important quality of a successful CISO?
    • Do cybersecurity professionals think their organization’s CISO’s level of participation with executive management and the board of directors is adequate?
    • How would cybersecurity professionals characterize the working relationships between their organization’s cybersecurity and IT departments and between cybersecurity and lines-of-business groups?
    • Which actions do cybersecurity professionals believe their organization could take to improve cybersecurity programs?

    Survey participants represented a wide range of industries including manufacturing, technology, financial services, and retail/wholesale. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (April 2023 – September 2023) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM.

    In this report you will find:


    • The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.


    • The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Collaboration Tool Security Risks Proliferate

    Our more mobile, distributed workforce has become dependent on a diverse collection of digital communication and collaboration tools, expanding the attack surface and creating new opportunities for adversaries to evade security controls. Many organizations currently lack visibility and control of one or more of the many tools their workers depend on. While email security strategies remain critical, new, more comprehensive security strategies are needed that are capable of monitoring and protecting sensitive data and access to both sanctioned and unsanctioned tools.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Despite ongoing advancements to cloud-delivered, native email security controls, organizations still view email as the most vulnerable to attack compared to other communication and collaboration mechanisms. Research by Enterprise Strategy Group also showed that most organizations have encountered challenges and gaps in their primary email security solution. As threats continue to penetrate security controls, organizations are using a layered approach that most commonly includes the addition of third-party controls.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Women in Cybersecurity

    In this video, Enterprise Strategy Group’s Senior Analyst Melinda Marks and Senior Account Director Johanna Schlegel share their experiences as women in the cybersecurity industry and what they are excited about as we build this new community.

    For more information, be sure to read Melinda’s blog on the inspiration behind this initiative and where she explores:

    • Do we really need another  women’s forum?
    • Our goals for this community (it’s simple: women supporting women).
    • How you can join us and get involved!

    Join the community!

    If you are interested in participating in an interview about your experience as a woman in the cybersecurity industry, or would like to nominate someone else, please complete the form below and mention Women in Cybersecurity.

    All fields are required.

    Quoation Mark

    I’m confident in my skills and achievements. I want to be recognized on a level playing field. I am comfortable competing with men for jobs or for recognition. I don’t want to be selected for something based on my gender because of someone’s requirement to recognize more females…But let’s face it, women are underrepresented in our field.”

    Melinda Marks
    Enterprise Strategy Group Senior Analyst

    Women Inspiring Women

    Melinda Marks and Fleur Chapman, COO of ITC Secure discuss:

    • How Fleur was recruited into a cybersecurity role due to her experience in previous roles
    • Her biggest challenges both internally and with customers
    • Her advice to be confident in yourself and your ability

    Want to hear more? Listen to the full interview here!

    Melinda Marks and Tanya Janca, Founder & CEO of We Hack Purple Community discuss:

    • Tanya’s computer programming background that began in childhood
    • The experiences that led her to write her first book, Alice and Bob Learn Application Security
    • The importance of diversity in the cybersecurity industry


    Want to hear more? Listen to the full interview here!

    Melinda Marks and Barbie Bigelow, CEO at Emerald Growth Partners, LLC discuss:

    • How Barbie got into cybersecurity by operational necessity
    • Keys to success throughout her career journey
    • Launching the Women Cyber Governance Collaborative

    Want to hear more? Listen to the full interview here!

    Melinda Marks and Arti Raman, the CEO and Founder of Titaniam discuss:

    • How did you get into this field?
    • What about your field of study? Your education?
    • What were your priorities as a CISO?


    Want to hear more? Listen to the full interview here!

    Melinda Marks and Laurie Haley, VP of Strategic Alliances at Veracode discuss:

    • What got you into this field?
    • Can you tell me a little bit about your role at Veracode?
    • What challenges have you faced along the way?

    Want to hear more? Listen to the full interview here!

    Melinda Marks and Wendy Thomas, CEO at Secureworks discuss:

    • What got you into this field, and what do you like about it?
    • You have a background in finance and business. Does that shape what you do today?
    • Can you tell me about Secureworks and the roles that you had there when you joined?


    Want to hear more? Listen to the full interview here!

    Melinda Marks and Helen Patton, Advisory CISO Strategy and Planning at Cisco discuss:

    • What got you into this field?
    • Did your education shape what you do today?
    • When did you transition into Cybersecurity?

    Want to hear more? Listen to the full interview here!

    Alex Arcilla and Gisela Hinojosa, Pentester at Cobalt discuss:

    That working in cybersecurity is really THE thing to do right now. The opportunities seem endless. But exactly what paths can you pursue when entering a field that is constantly evolving?


    Want to hear more? Listen to the full interview here!

    Melinda Marks and Brittany Greenfield, founder and CEO at Wabbi discuss:

    • Starting her career with a degree in biotechnology
    • Turning her focus to cybersecurity
    • Now leads a company integrating security into software development

    Want to hear more? Listen to the full interview here!

    Melinda Marks and Vandana Verma Sehgal discuss:

    • How Vendana got her start working in security operations
    • Her involvement in OWASP—leading to becoming the first female chair of the board!
    • Vendana’s passion for bringing more diversity to infosec


    Want to hear more? Listen to the full interview here!

    Melinda Marks and Elizabeth Gossell discuss:

    • The evolving security challenges that come with M&A efforts, scaling, and sprawl
    • Liz’s experience in cybersecurity that started with an internship
    • Why career development and being a strong advocate for yourself is so critical for women

    Want to hear more? Listen to the full interview here!

    Melinda Marks and Caroline Wong discuss:

    • Caroline’s experience in the cybersecurity industry
    • Her advice on team culture and diversity in the workplace
    • Overcoming toxic work environments, work-life and family balance, resilience, and trusting our future selves to overcome these challenges


    Want to hear more? Listen to the full interview here!

    Melinda Marks and Sharon Goldberg discuss:

    • Sharon’s move from engineering to computer science and internet security
    • What motivated her to go from tenured professor to cofounder and CEO of BastionZero
    • How much progress has been made for women in the fast-moving cybersecurity industry

    Want to hear more? Listen to the full interview here!

  • Generative artificial intelligence (GenAI) recently stormed the market and mindshare of decision makers across industries and major geographic markets. Business leaders see a massive opportunity to positively impact operations and customer strategies with GenAI, but its adoption and use across all business units carry a fair share of trepidation.

    Learn more about these trends with the infographic, Beyond the GenAI Hype: Real-world Investments, Use Cases, and Concerns.

  • Application developers are challenged with efficiently creating innovative solutions while managing time constraints, which can be mitigated by the transformative impacts of generative artificial intelligence (AI) streamlining code generation and accelerating development processes. Organizations have integrated generative AI (GenAI) into their operational setup to accelerate code creation, refine code structures, elevate code quality, and deliver personalized customer experiences. By harnessing GenAI, application developers tackle issues by capitalizing on the technology’s ability to automate tasks, drive creativity, and deliver innovative solutions.

    (more…)