Cybersecurity

  • Organizations struggle to effectively mitigate threat and vulnerability exposure due to a lack of visibility into their always-changing cyber asset landscape. This problem is made even more difficult by the increasing growth and complexity of cloud-native technologies. Recent research by TechTarget’s Enterprise Strategy Group shows that while organizations may recognize the importance of real-time asset data for managing cyber-risk, only a small percentage are continuously collecting and analyzing this information from a security perspective.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The rise of cloud-native infrastructure is driving efforts to modernize application development. However, it’s simultaneously creating new and complex security issues. The increased pace and ephemeral nature of cloud-native development makes asset visibility and infrastructure configuration security difficult. This report discusses how organizations can achieve cloud-native risk reduction using modern infrastructure security tactics and technologies. As application development is modernized, security teams must innovate around the security processes they provide to the development team to secure their applications.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Heightened attention around strengthening network security for the cloud has rejuvenated a well-established market. Recent research by TechTarget’s Enterprise Strategy Group investigated where organizations prefer to procure their cloud- firewalls from, with the data offering conflicting views of what comes next.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are looking to adopt generative AI (GenAI) to enable employees, especially software developers, to increase productivity and gain a competitive advantage. TechTarget’s Enterprise Strategy Group research shows that with cloud-native application development, most organizations are either already using GenAI and chatbot tools or they are planning to use them. However, because application security teams need effective programs to ensure security of their software applications, their top concerns are around GenAI usage. As modern application security should enable use of innovative technologies to support business growth, this brief explores strategies to support secure GenAI use.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Modern application architectures with complex relationships and ephemeral resources have resulted in a proliferation of non-human access to communicate and exchange data. Enterprise IT cybersecurity and operations teams are recognizing the risk associated with the large and growing volume of non-human identities. As cloud adoption and automation continue to grow, effective non-human identity management has become essential for maintaining security, facilitating business operations, and supporting digital transformation initiatives. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and DevOps, platform, and cybersecurity engineering professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Managing Non-human Identities for an Effective Cybersecurity Program.

  • Enterprise IT cybersecurity and operations teams are recognizing the risk associated with the large and growing volume of non-human identities (NHIs). Modern application architectures with complex relationships and ephemeral resources have resulted in a proliferation of non-human access to communicate and exchange data. NHI is an emerging space with unique characteristics and lifecycle requirements when compared with the more established human identity and access management (IAM) domain. Inadequate security for non-human identities poses significant security risks given the significant access and privileges provided to non-human identity infrastructure. Specifically, poor security for NHIs can lead to data breaches, operational disruptions, and compliance violations. As cloud adoption and automation continue to grow, effective non-human identity management has become essential for maintaining security, facilitating business operations, and supporting digital transformation initiatives.

    To gain further insight into these trends and issues, TechTarget’s Enterprise Strategy Group surveyed 367 IT, cybersecurity, and DevOps, platform, and cybersecurity engineering professionals at organizations in North America (US and Canada) involved with or responsible for the technologies and processes that secure non-human identities and machine workloads.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on non-human identities (NHIs), including the hurdles to gaining visibility and lifecycle control over NHIs as well as the business agility and compliance challenges posed by the management of NHIs.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Companies are regressing in the ability to manage cyber-risk and vulnerabilities due to a lack of broad asset discovery and state monitoring, deficient surface depth threat intelligence and point-in-time assessment, and insufficient vulnerability context to make prioritization possible. A lack of automation is creating an environment where the time it takes to assess state and security posture takes too long, causing analysis to be conducted on stale context. Recent research by TechTarget’s Enterprise Strategy Group reveals that cybersecurity leaders must focus on improving what data they collect, while building a system that is fast enough to keep up with a modern enterprise environment’s pace of change. To achieve this, organizations expect cyber-risk management tools to consolidate disparate data sets into something much broader over time and build a continuous approach to vulnerability and risk management.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Cyber-risk Management Best Practices

    Today’s business technology ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insight into trends surrounding the challenges of addressing modern cyber-risk.

    To learn more about these trends, download the free infographic, Cyber-risk Management Best Practices.

  • Cyber-risk Management Best Practices

    Cyber-risk management is critical for any modern business operation or initiative, with adherence to security standards and best practices, continuous risk assessments and vulnerability scanning, and better understanding of asset state driving practices maturity. But addressing cyber-risk is becoming more complex with expanding attack surfaces, evolving cybersecurity threats, novel forms of data breaches, new attack vectors, and previously unknown vulnerabilities.

    Further, organizations are increasingly managing workloads in cloud environments for the benefits of scale and productivity in addition to on-premises data centers. So, today’s modern ecosystems consist of hybrid or multi-cloud environments, ephemeral assets, expanding attack surfaces, external SaaS and third-party connections, and dynamic cloud-native applications. These infrastructure complexities present new challenges for asset visibility, understanding attack surfaces, securing business-critical assets, and managing their associated risk.

    To gain further insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and cybersecurity professionals in North America (US and Canada) involved with cybersecurity risk management technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Organizations are increasingly adopting DevOps practices to shift IT and operations left to developers so they can provision and deploy their software applications with the help of cloud services. At the same time, they’re attempting to shift the associated cybersecurity responsibilities left as well—a practice known as DevSecOps. Recent research by TechTarget’s Enterprise Strategy Group investigated the state of adopting DevSecOps to integrate security into the software development lifecycle (SDLC), including teams’ progress, top challenges, and investment plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging continuous integration and continuous deployment (CI/CD) pipelines and Kubernetes to automate deployment. Platform solutions offering to gather telemetry and automate security tools and processes can help security teams prioritize and drive actions that have a high impact on reducing risk. Recent research by TechTarget’s Enterprise Strategy Group revealed how organizations desire to leverage suites and platforms procured from a smaller set of vendors or even a single vendor to reduce complexity and realize a unified cybersecurity posture across distributed cloud environments.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.