Cybersecurity

  • Despite their need for comprehensive cybersecurity programs, midmarket and small enterprise organizations often have limited budgets and resources, making attracting skilled personnel challenging for these firms. Gaps in security visibility, policies, processes, and infrastructure plus a tendency to use older systems and software make these organizations more vulnerable to attack than businesses with more mature and better funded cybersecurity cultures. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Midmarket and Small Enterprise Cybersecurity Program Development: A Work in Progress.

  • A promising new crop of vendors has sprouted up to address application security posture management (ASPM). While new research from TechTarget’s Enterprise Strategy Group on modern application security trends revealed challenges streamlining remediation efforts to reduce cybersecurity incidents and their effects that an ASPM might able to address, it is a newly emerging area that needs to be better defined to help orchestrate better security processes and tools throughout the software development lifecycle.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The Need for Effective Secrets Management

    As modern application development processes enable teams to increase productivity and scale, effective secrets management plays a crucial role. Research from TechTarget’s Enterprise Strategy Group showed that security, application development, and infrastructure teams are challenged with secrets management—the processes and tools used to securely store, manage, and access sensitive credential information such as passwords, API keys, digital certificates, and encryption keys—and need an effective strategy to mitigate risk.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Cybersecurity professionals contend with persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. There is also a crisis in cybersecurity leadership, as organizations don’t provide adequate support for their cybersecurity programs or the professionals tasked with executing them. Overall, CISOs are under immense pressure and urgently need to have a stronger voice at the highest levels of their organizations to advocate for necessary changes. TechTarget’s Enterprise Strategy Group together with ISSA recently surveyed IT and cybersecurity professionals across the globe to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Life and Times of Cybersecurity Professionals Volume VII.

  • The seventh annual Life and Times of Cybersecurity Professionals study continues to pinpoint many of the same issues as past editions, underscoring persistent challenges such as rising cyberthreats, IT complexity, ubiquitous vulnerabilities, heavy workloads, and difficulties embedding cybersecurity into organizational processes and cultures. Beyond illustrating cybersecurity problems, this year’s edition highlights specific areas where cybersecurity professionals suggest ways their organizations can alleviate the burdens on cybersecurity practitioners while simultaneously bolstering defenses and reducing risks.

    Above all, the report’s most significant revelation is a crisis in cybersecurity leadership as organizations don’t provide adequate support for their cybersecurity programs or the professionals tasked with executing them. This is evident in areas like inadequate training of non-cybersecurity staff, the lack of integration between cybersecurity and other business functions, and ineffective human resources efforts to recruit specialized cybersecurity talent. Overall, the survey findings reveal immense pressures on CISOs and emphasize the urgent need for them to have a stronger voice at the highest levels of their organizations to advocate for necessary changes on each of these fronts.

    This serves as the seventh such research project, dating back to 2016. All references to previous Enterprise Strategy Group and ISSA research in this report can be found in The Life and Times of Cybersecurity Professionals Volume VI.

    To learn more, download the free report, The Life and Times of Cybersecurity Professionals Volume VII.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (April 2024 – September 2024) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM. In this report you will find:

    ·The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.

    ·The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Despite their need for comprehensive cybersecurity programs, midmarket and small enterprise organizations often have limited budgets and resources, which can make attracting skilled personnel challenging for these firms. Gaps in security visibility, policies, processes, and infrastructure plus a tendency to use older systems and software make these organizations more vulnerable to attack than businesses with more mature and better funded cybersecurity cultures. Even with continued successful cyberattacks across industries, midmarket and small enterprise organizations frequently fail to react quickly or sufficiently to threats, accepting risk without understanding the potential impact. Highly dependent on third-party SaaS applications and infrastructure, smaller companies often lack visibility into operational threat signals, resulting in an excessive progression of attacks before discovery.

    To further assess and understand the current state of cybersecurity programs at these smaller organizations, TechTarget’s Enterprise Strategy Group surveyed 379 IT and cybersecurity professionals at midmarket and small enterprise organizations in North America (US and Canada).

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • This Complete Survey Results presentation focuses on security needs and preferred strategies for midmarket and small enterprise organizations, including the current state of security program development and the associated gaps and challenges.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Platforms Are Critical for SaaS Security

    Maintaining a strong SaaS security posture that includes the right controls, levels of visibility, and threat detection while accounting for new application types like generative AI is a complex task today. Recent research by TechTarget’s Enterprise Strategy Group suggests that the platform approach is coming to the fore as a preferred strategy for IT teams that need to bring a range of functionality together for the crucial task of securing SaaS applications.

    Already an Enterprise Strategy Group client? Log in to read the full report. If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Enterprise Browsers Gain Traction

    Securing access across different types of user device and corporate resources continues to challenge even the most sophisticated IT organizations. Enterprise browsers provide an alternative to strictly network-based solutions by adding security enforcement closest to where many users spend the majority of their time: the browser. Recent research by TechTarget’s Enterprise Strategy Group investigated IT decision-makers’ perspectives on how enterprise browsers fit into their broader network security strategies.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, Modernizing Application Security to Scale for Cloud-native Development.

  • As organizations are under increasing pressure to boost productivity and gain a competitive advantage, they are modernizing application development processes. However, as the adoption of new technologies helps them scale software development for greater speed and volume of releases, security teams need to keep pace to effectively manage risk and protect applications from threats. Traditional application security methods may be disruptive or even slow down development processes. As development teams scale using cloud-native technologies and modernized processes, the higher chance for mistakes creates software vulnerabilities that leave them susceptible to attack. Security teams need a modernized approach to efficiently incorporate security tools and processes across the software development lifecycle while promoting business growth by supporting development as it scales.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 350 IT, cybersecurity, and application development professionals in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.