Cybersecurity

  • Regardless of company size, robust cybersecurity programs are a business-critical element of any organization that doesn’t want to risk data exfiltration, ransomware, regulatory scrutiny, and other threats. However, recent research by Enterprise Strategy Group, now part of Omdia, revealed that organizational size often correlates with the degree of development and maturity of its cybersecurity programs, especially for those operating as midmarket firms. How can these firms keep up? Where should they focus first?

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As pivotal, operations-supporting technologies, securing cloud infrastructure and applications as well as the data stored in or traveling between them is a major priority for cybersecurity teams today. Recent research by Enterprise Strategy Group, now part of Omdia, revealed that despite their size, smaller enterprises often have mature cybersecurity programs, leveraging many of the same strategies used by much larger, better staffed enterprises. And their challenges align too, as small enterprises also struggle to keep up with increasingly more diverse attack surfaces, tools complexity, and cloud security operations.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Entrust announced the sale of its certificate authority business to Sectigo in January 2025, an event that will cause many enterprises to reevaluate their certificate lifecycle management strategy. Recent research by Informa TechTarget’s Enterprise Strategy Group into non-human identities (NHIs) revealed that digital certificates were of concern to enterprises,1 and the Entrust-Sectigo transaction reinforces the need for enterprises to maintain crypto agility to adapt to and recover from changes in cryptographic infrastructure. Enterprises should focus on gaining visibility into their expanding digital certificate estate in preparation for upcoming changes posed by shortening certificate validity periods and impending changes needed to prepare for post-quantum cryptography (PQC).

    To learn more, download the free brief, Entrust Selling Certificate Business Underscores Need for Enterprise Crypto Agility.

  • False Confidence Around API Security Persists

    APIs are crucial parts of modern application architectures, facilitating critical functionality, communication, and data movement. Unfortunately, each API could be an entry point for a cyberattack if a bad actor finds a vulnerability. Recent research by Informa TechTarget’s Enterprise Strategy Group investigated the state of API security programs and whether the teams behind their operation have a handle on the risk associated with this attack vector.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The Transition Toward API-specific Security Tools

    APIs act as critical connections between applications and data within myriad IT processes today, and as such, they make for strong targets for cyberattackers looking to gain access to organizations’ systems. Due to several unique facets of APIs, securing them against cyberthreats requires specialized technologies. Recent research by Informa TechTarget’s Enterprise Strategy Group found that many organizations may not be using purpose-built API security tools to the extent they should, which is to their detriment.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As organizations across industries work to modernize their environments with the help of AI, internal shortages of necessary skills are becoming apparent for many. These circumstances are arising alongside long-time skill shortages in cybersecurity that have yet to be resolved. Recent research by Informa TechTarget’s Enterprise Strategy Group investigated the links between the most critical skill gaps organizations face today and firmographic features, such as operating region and cloud policies.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Non-human identities (NHIs) play a role in practically every IT process, from application communication to AI initiatives. NHIs typically have significant privileges that can be manipulated during cyberattacks. While human identities have played a well-understood role in cyberattacks, under-secured NHIs are becoming more recognized as a contributing factor to cyberincidents. Recent research by TechTarget’s Enterprise Strategy Group found that exposed NHIs are indeed contributing to today’s incidents and successful breaches involving NHIs typically get board-level attention.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Non-human identities (NHIs) are a critical part of IT operations at many businesses today for the roles they play in a variety of processes, from data exchange and application communication to IoT connections and AI functions. Recent research by TechTarget’s Enterprise Strategy Group revealed that these identities are proliferating against a backdrop of ongoing digital transformation and technology innovations, and that means organizations must develop strategies to observe and secure their NHI estate to control the risk this part of a rapidly expanding cyberattack surface poses.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (July 2024 – December 2024) in five (5) regions across the Informa TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM. In this report you will find:

    • The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.

    • The top 25 granular topics growing the most across the Informa TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • API Security From Development to Runtime

    Every API is a potential attack vector, and adversaries have a variety of avenues to compromise endpoints at their disposal. Attacks on availability, exploitation of weak authentication, and the abuse of shadow APIs are all common and can easily lead to sensitive data loss. Success requires security operations and tools spanning the software development process, from development to runtime, to help teams discover, manage, configure, monitor, and protect APIs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, API Security From Development to Runtime.

  • API Security From Development to Runtime

    Every API is a potential attack vector, and adversaries have a variety of avenues to compromise endpoints at their disposal. Attacks on availability, exploitation of weak authentication, and the abuse of shadow APIs are all common and can easily lead to sensitive data loss. The breadth of tools used to secure APIs and issues with collaboration across personas responsible for ensuring secure development, deployment, and operation of APIs may be creating more challenges than organizations realize. Success requires security operations and tools spanning the software development process, from development to runtime, to help teams discover, manage, configure, monitor, and protect APIs. Leaders need to understand the behaviors that forward-thinking organizations have undertaken and how to properly assess solutions to secure APIs from development to runtime.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 385 IT, cybersecurity, and application development professionals in North America (US and Canada) involved securing their organization’s APIs.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • API Security From Development to Runtime

    This Complete Survey Results presentation focuses on the usage of APIs within modern application development processes, including the security challenges presented by these trends as well as the best practices for managing API security risk and protecting applications from API attacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.