Cybersecurity

  • The Transition Toward API-specific Security Tools

    APIs act as critical connections between applications and data within myriad IT processes today, and as such, they make for strong targets for cyberattackers looking to gain access to organizations’ systems. Due to several unique facets of APIs, securing them against cyberthreats requires specialized technologies. Recent research by Informa TechTarget’s Enterprise Strategy Group found that many organizations may not be using purpose-built API security tools to the extent they should, which is to their detriment.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As organizations across industries work to modernize their environments with the help of AI, internal shortages of necessary skills are becoming apparent for many. These circumstances are arising alongside long-time skill shortages in cybersecurity that have yet to be resolved. Recent research by Informa TechTarget’s Enterprise Strategy Group investigated the links between the most critical skill gaps organizations face today and firmographic features, such as operating region and cloud policies.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Non-human identities (NHIs) play a role in practically every IT process, from application communication to AI initiatives. NHIs typically have significant privileges that can be manipulated during cyberattacks. While human identities have played a well-understood role in cyberattacks, under-secured NHIs are becoming more recognized as a contributing factor to cyberincidents. Recent research by TechTarget’s Enterprise Strategy Group found that exposed NHIs are indeed contributing to today’s incidents and successful breaches involving NHIs typically get board-level attention.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Non-human identities (NHIs) are a critical part of IT operations at many businesses today for the roles they play in a variety of processes, from data exchange and application communication to IoT connections and AI functions. Recent research by TechTarget’s Enterprise Strategy Group revealed that these identities are proliferating against a backdrop of ongoing digital transformation and technology innovations, and that means organizations must develop strategies to observe and secure their NHI estate to control the risk this part of a rapidly expanding cyberattack surface poses.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (July 2024 – December 2024) in five (5) regions across the Informa TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM. In this report you will find:

    • The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.

    • The top 25 granular topics growing the most across the Informa TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • API Security From Development to Runtime

    Every API is a potential attack vector, and adversaries have a variety of avenues to compromise endpoints at their disposal. Attacks on availability, exploitation of weak authentication, and the abuse of shadow APIs are all common and can easily lead to sensitive data loss. Success requires security operations and tools spanning the software development process, from development to runtime, to help teams discover, manage, configure, monitor, and protect APIs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, API Security From Development to Runtime.

  • API Security From Development to Runtime

    Every API is a potential attack vector, and adversaries have a variety of avenues to compromise endpoints at their disposal. Attacks on availability, exploitation of weak authentication, and the abuse of shadow APIs are all common and can easily lead to sensitive data loss. The breadth of tools used to secure APIs and issues with collaboration across personas responsible for ensuring secure development, deployment, and operation of APIs may be creating more challenges than organizations realize. Success requires security operations and tools spanning the software development process, from development to runtime, to help teams discover, manage, configure, monitor, and protect APIs. Leaders need to understand the behaviors that forward-thinking organizations have undertaken and how to properly assess solutions to secure APIs from development to runtime.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 385 IT, cybersecurity, and application development professionals in North America (US and Canada) involved securing their organization’s APIs.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • API Security From Development to Runtime

    This Complete Survey Results presentation focuses on the usage of APIs within modern application development processes, including the security challenges presented by these trends as well as the best practices for managing API security risk and protecting applications from API attacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations struggle to effectively mitigate threat and vulnerability exposure due to a lack of visibility into their always-changing cyber asset landscape. This problem is made even more difficult by the increasing growth and complexity of cloud-native technologies. Recent research by TechTarget’s Enterprise Strategy Group shows that while organizations may recognize the importance of real-time asset data for managing cyber-risk, only a small percentage are continuously collecting and analyzing this information from a security perspective.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The rise of cloud-native infrastructure is driving efforts to modernize application development. However, it’s simultaneously creating new and complex security issues. The increased pace and ephemeral nature of cloud-native development makes asset visibility and infrastructure configuration security difficult. This report discusses how organizations can achieve cloud-native risk reduction using modern infrastructure security tactics and technologies. As application development is modernized, security teams must innovate around the security processes they provide to the development team to secure their applications.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Heightened attention around strengthening network security for the cloud has rejuvenated a well-established market. Recent research by TechTarget’s Enterprise Strategy Group investigated where organizations prefer to procure their cloud- firewalls from, with the data offering conflicting views of what comes next.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are looking to adopt generative AI (GenAI) to enable employees, especially software developers, to increase productivity and gain a competitive advantage. TechTarget’s Enterprise Strategy Group research shows that with cloud-native application development, most organizations are either already using GenAI and chatbot tools or they are planning to use them. However, because application security teams need effective programs to ensure security of their software applications, their top concerns are around GenAI usage. As modern application security should enable use of innovative technologies to support business growth, this brief explores strategies to support secure GenAI use.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.