Cybersecurity

  • Securing applications against exploit, denial of service, and other forms of cyberattack is a mission-critical goal for many cybersecurity teams today. However, due to the distributed nature of most IT environments, responsibility for application security involves a range of roles and teams such as those supporting cloud computing, on-premises technologies, networking, fraud, application development, and more. Recent research by Enterprise Strategy Group, now part of Omdia, investigated the degree of collaboration between these teams that contribute to the efficacy of the application security programs.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Reaching a Tipping Point With API Security

    Application security has become more difficult in large part due to the wide range of tactics attackers can use to exploit their targets. APIs in particular have been a growing concern as applications become more interconnected and reliant on microservices. Recent research by Enterprise Strategy Group, now part of Omdia, found that API security vulnerabilities have not been receiving the attention and resources needed to appropriately mitigate growing threats, but that might be changing.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • The Future of SecOps in an AI-driven World

    Security operations (SecOps) is a mainstay of modern security programs. Once focused on reactive, alert-driven activities, today’s security operations have expanded to a risk mitigation function, inclusive of both proactive and reactive strategies like threat detection, response, and recovery. With such a broad scope of responsibility, it’s no surprise that the number and complexity of systems and technologies involved continue to grow, heavily influenced by the more recent explosion of generative AI (GenAI) adoption. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more, download the free infographic, The Future of SecOps in an AI-driven World.

  • The Future of SecOps in an AI-driven World

    SecOps is a mainstay of modern security programs. Once focused on reactive, alert-driven activities, today’s SecOps has expanded to a risk mitigation function, inclusive of both proactive and reactive strategies like security posture management, core security controls optimization and tuning, detection and response, and recovery in the event of a harmful cyberattack. This expanded agenda has also increased collaboration with other functions, including risk management, IT, OT, software development and engineering, supply chain management, and more. With such a broad scope of responsibility, it’s no surprise that the number and complexity of systems and technologies involved continue to grow, heavily influenced by the more recent explosion of GenAI adoption.

    Despite all of this, for the first time in the past five years, this research indicates that the scales are tipping, as more organizations reported this year that SecOps is getting easier. This improvement is fueled by three industry mega-trends: tool consolidation, the application of GenAI within SecOps, and the effectiveness of XDR solutions.

    To gain further insights into these mega-trends and other developments in the security operations space, Enterprise Strategy Group surveyed 366 IT and cybersecurity professionals at large midmarket and enterprise organizations in North America (U.S. and Canada) involved with security operations technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • The Future of SecOps in an AI-driven World

    This Complete Survey Results presentation focuses on current security operations programs and posture, including security operations centers, and how automation and generative AI (GenAI) technologies are helping to augment and optimize these environments.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Application environments are more complex than ever, with web applications increasingly cloud-resident, containerized, connected via APIs, and delivered via CDNs. On top of this increasingly heterogeneous environment, security responsibility is distributed across a variety of roles and personas. This has resulted in complexity and tool sprawl as security teams struggle to keep pace, with attackers understanding this and using it to their advantage. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more, download the free infographic, Balancing Requirements for Application Protection.

  • Application environments are more complex than ever, with web applications increasingly cloud-resident, containerized, connected via APIs, and delivered via CDNs. On top of this increasingly heterogeneous environment, security responsibility is distributed across a variety of roles and personas. This has resulted in complexity and tool sprawl as security teams struggle to keep pace. Attackers understand this and use it to their advantage through exploits against known vulnerabilities and advanced campaigns that use a variety of tactics such as bots that amplify denial-of-service and credential attacks on web applications and the APIs that tie them together. While platforms are attractive, security cannot be compromised. Security leaders need to understand the actions that forward-thinking organizations have undertaken to properly assess which tools are best positioned to solve the key business challenges they face.

    To gain insights into these trends, Enterprise Strategy Group surveyed 383 IT and cybersecurity professionals in North America (U.S. and Canada) involved with securing their organization’s web applications and APIs.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • This Complete Survey Results presentation focuses web application environments, challenges with protecting public-facing web applications, attack impacts, threat vectors, web application firewall (WAF) usage and preferences, bot management, consolidated solutions, personnel, spending, and future plans.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us

  • Regardless of company size, robust cybersecurity programs are a business-critical element of any organization that doesn’t want to risk data exfiltration, ransomware, regulatory scrutiny, and other threats. However, recent research by Enterprise Strategy Group, now part of Omdia, revealed that organizational size often correlates with the degree of development and maturity of its cybersecurity programs, especially for those operating as midmarket firms. How can these firms keep up? Where should they focus first?

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As pivotal, operations-supporting technologies, securing cloud infrastructure and applications as well as the data stored in or traveling between them is a major priority for cybersecurity teams today. Recent research by Enterprise Strategy Group, now part of Omdia, revealed that despite their size, smaller enterprises often have mature cybersecurity programs, leveraging many of the same strategies used by much larger, better staffed enterprises. And their challenges align too, as small enterprises also struggle to keep up with increasingly more diverse attack surfaces, tools complexity, and cloud security operations.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Entrust announced the sale of its certificate authority business to Sectigo in January 2025, an event that will cause many enterprises to reevaluate their certificate lifecycle management strategy. Recent research by Informa TechTarget’s Enterprise Strategy Group into non-human identities (NHIs) revealed that digital certificates were of concern to enterprises,1 and the Entrust-Sectigo transaction reinforces the need for enterprises to maintain crypto agility to adapt to and recover from changes in cryptographic infrastructure. Enterprises should focus on gaining visibility into their expanding digital certificate estate in preparation for upcoming changes posed by shortening certificate validity periods and impending changes needed to prepare for post-quantum cryptography (PQC).

    To learn more, download the free brief, Entrust Selling Certificate Business Underscores Need for Enterprise Crypto Agility.

  • False Confidence Around API Security Persists

    APIs are crucial parts of modern application architectures, facilitating critical functionality, communication, and data movement. Unfortunately, each API could be an entry point for a cyberattack if a bad actor finds a vulnerability. Recent research by Informa TechTarget’s Enterprise Strategy Group investigated the state of API security programs and whether the teams behind their operation have a handle on the risk associated with this attack vector.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.