Cybersecurity

  • Modern application architectures with complex relationships and ephemeral resources have resulted in a proliferation of non-human access to communicate and exchange data. Enterprise IT cybersecurity and operations teams are recognizing the risk associated with the large and growing volume of non-human identities. As cloud adoption and automation continue to grow, effective non-human identity management has become essential for maintaining security, facilitating business operations, and supporting digital transformation initiatives. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and DevOps, platform, and cybersecurity engineering professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Managing Non-human Identities for an Effective Cybersecurity Program.

  • Enterprise IT cybersecurity and operations teams are recognizing the risk associated with the large and growing volume of non-human identities (NHIs). Modern application architectures with complex relationships and ephemeral resources have resulted in a proliferation of non-human access to communicate and exchange data. NHI is an emerging space with unique characteristics and lifecycle requirements when compared with the more established human identity and access management (IAM) domain. Inadequate security for non-human identities poses significant security risks given the significant access and privileges provided to non-human identity infrastructure. Specifically, poor security for NHIs can lead to data breaches, operational disruptions, and compliance violations. As cloud adoption and automation continue to grow, effective non-human identity management has become essential for maintaining security, facilitating business operations, and supporting digital transformation initiatives.

    To gain further insight into these trends and issues, TechTarget’s Enterprise Strategy Group surveyed 367 IT, cybersecurity, and DevOps, platform, and cybersecurity engineering professionals at organizations in North America (US and Canada) involved with or responsible for the technologies and processes that secure non-human identities and machine workloads.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on non-human identities (NHIs), including the hurdles to gaining visibility and lifecycle control over NHIs as well as the business agility and compliance challenges posed by the management of NHIs.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Companies are regressing in the ability to manage cyber-risk and vulnerabilities due to a lack of broad asset discovery and state monitoring, deficient surface depth threat intelligence and point-in-time assessment, and insufficient vulnerability context to make prioritization possible. A lack of automation is creating an environment where the time it takes to assess state and security posture takes too long, causing analysis to be conducted on stale context. Recent research by TechTarget’s Enterprise Strategy Group reveals that cybersecurity leaders must focus on improving what data they collect, while building a system that is fast enough to keep up with a modern enterprise environment’s pace of change. To achieve this, organizations expect cyber-risk management tools to consolidate disparate data sets into something much broader over time and build a continuous approach to vulnerability and risk management.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Cyber-risk Management Best Practices

    Today’s business technology ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insight into trends surrounding the challenges of addressing modern cyber-risk.

    To learn more about these trends, download the free infographic, Cyber-risk Management Best Practices.

  • Cyber-risk Management Best Practices

    Cyber-risk management is critical for any modern business operation or initiative, with adherence to security standards and best practices, continuous risk assessments and vulnerability scanning, and better understanding of asset state driving practices maturity. But addressing cyber-risk is becoming more complex with expanding attack surfaces, evolving cybersecurity threats, novel forms of data breaches, new attack vectors, and previously unknown vulnerabilities.

    Further, organizations are increasingly managing workloads in cloud environments for the benefits of scale and productivity in addition to on-premises data centers. So, today’s modern ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external SaaS and third-party connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk.

    To gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and cybersecurity professionals in North America (US and Canada) involved with cybersecurity risk management technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are increasingly adopting DevOps practices to shift IT and operations left to developers so they can provision and deploy their software applications with the help of cloud services. At the same time, they’re attempting to shift the associated cybersecurity responsibilities left as well—a practice known as DevSecOps. Recent research by TechTarget’s Enterprise Strategy Group investigated the state of adopting DevSecOps to integrate security into the software development lifecycle (SDLC), including teams’ progress, top challenges, and investment plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging continuous integration and continuous deployment (CI/CD) pipelines and Kubernetes to automate deployment. Platform solutions offering to gather telemetry and automate security tools and processes can help security teams prioritize and drive actions that have a high impact on reducing risk. Recent research by TechTarget’s Enterprise Strategy Group revealed how organizations desire to leverage suites and platforms procured from a smaller set of vendors or even a single vendor to reduce complexity and realize a unified cybersecurity posture across distributed cloud environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Despite their need for comprehensive cybersecurity programs, midmarket and small enterprise organizations often have limited budgets and resources, making attracting skilled personnel challenging for these firms. Gaps in security visibility, policies, processes, and infrastructure plus a tendency to use older systems and software make these organizations more vulnerable to attack than businesses with more mature and better funded cybersecurity cultures. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Midmarket and Small Enterprise Cybersecurity Program Development: A Work in Progress.

  • A promising new crop of vendors has sprouted up to address application security posture management (ASPM). While new research from TechTarget’s Enterprise Strategy Group on modern application security trends revealed challenges streamlining remediation efforts to reduce cybersecurity incidents and their effects that an ASPM might able to address, it is a newly emerging area that needs to be better defined to help orchestrate better security processes and tools throughout the software development lifecycle.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The Need for Effective Secrets Management

    As modern application development processes enable teams to increase productivity and scale, effective secrets management plays a crucial role. Research from TechTarget’s Enterprise Strategy Group showed that security, application development, and infrastructure teams are challenged with secrets management—the processes and tools used to securely store, manage, and access sensitive credential information such as passwords, API keys, digital certificates, and encryption keys—and need an effective strategy to mitigate risk.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Cybersecurity professionals contend with persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. There is also a crisis in cybersecurity leadership, as organizations don’t provide adequate support for their cybersecurity programs or the professionals tasked with executing them. Overall, CISOs are under immense pressure and urgently need to have a stronger voice at the highest levels of their organizations to advocate for necessary changes. TechTarget’s Enterprise Strategy Group together with ISSA recently surveyed IT and cybersecurity professionals across the globe to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Life and Times of Cybersecurity Professionals Volume VII.