Cybersecurity

  • Streamlining Security Operations With Generative AI

    Virtually every business line is exploring and investing in generative AI (GenAI) to gain operational and competitive advantage. The realm of cybersecurity is no different, where security leaders are investing in GenAI to gain efficiencies in security operations (SecOps) in hopes of outmaneuvering their criminal adversaries—who are also likely pushing the limits of what GenAI can do to help achieve their means. Recent research by TechTarget’s Enterprise Strategy Group revealed that SecOps is ripe with opportunity for the use of GenAI, especially for organizations with certain characteristics.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The Evolution of Network Security

    As IT environments have grown more distributed and diverse, network security tools generally and firewalls specifically have become fragmented. Historically, the choice between CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with network security technology and processes to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Evolution of Network Security.

  • As IT environments have grown more distributed and diverse, network security tools, generally, and firewalls, specifically, have become fragmented. The availability of CSP firewalls, cloud-native firewalls, and firewall capabilities from networking tools has created confusion in the market. Historically, the choice between many of these options boiled down to ease of use and efficiency versus functionality and efficacy. However, organizations can no longer make tradeoffs. They require the best of both worlds and need help understanding their options for network security and the best fit for the use cases they need to support.

    To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 358 IT and cybersecurity professionals in North America (US and Canada) involved with network security technology and processes at their organization.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Securing the identities of both the humans and non-humans (also referred to as machines) that access systems to keep the business operating is a mission-critical task for cybersecurity teams. However, the constantly expanding nature of these identity estates make this job harder to do every day. Recent research by TechTarget’s Enterprise Strategy Group revealed that when identities are insufficiently secured, organizations become vulnerable to compromise and even successful cyberattacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Multifactor authentication (MFA) is a robust tool that teams tasked with securing a workforce’s credentials and identities frequently employ to ensure only the right people access critical systems and data. Recent research by TechTarget’s Enterprise Strategy Group shows that when it comes to making MFA a mandatory part of identity security for workforces, some firms are more apt to do so than others.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Digital experience optimization can be an exciting part of business strategy due to its potential to improve customer engagement and win brand loyalty. However, recent research by TechTarget’s Enterprise Strategy Group found that organizations are not eschewing precautions around cybersecurity in favor of other business motivations when considering platforms that enable digital experience operations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Achieving Cyber and Data Resilience

    In the face of ransomware and other cybersecurity threats, organizations are concerned with cyber resilience, especially the resilience of their data assets. For most organizations, data is a prime asset that drives core business processes, and in many cases, data is the business. Teams face unique challenges in their data resilience initiatives that seek to combine data security posture management, data protection (recoverability), and data governance. TechTarget’s Enterprise Strategy Group recently surveyed IT professionals about these dynamics to gain insights into these trends.

    To learn more about these trends, download the free infographic, Achieving Cyber and Data Resilience.

  • Securing SaaS Ecosystems

    Organizations have shifted from using a few discrete cloud applications to supporting an entire ecosystem around SaaS. Because these applications often house sensitive data, it is critical that security teams ensure they are properly configured, malware and compromised users are detected, and data is protected, all while controlling access from a range of both internal and third-party users. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals involved with securing their organization’s SaaS applications to gain insights into these trends.

    To learn more about these trends, download the free infographic, Securing SaaS Ecosystems.

  • DSPM comprises technology and processes that continuously monitor and assess an organization’s data security controls across all infrastructure, including on-premises data centers and private and public cloud environments. Recent data resilience research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to DSPM solution deployment and top use cases. While DSPM tools are relatively quick to deploy compared to other security technologies, organizations need to consider the people, process and technology when implementing DSPM and ensure they strategically plan an approach that will meet future needs to support scale and innovation, including usage of AI and generative AI (GenAI).

    To learn more, download the free brief, Streamlining Data Security Posture Management (DSPM) Implementations.

  • Generative AI (GenAI) is a technology teeming with possibilities, and those extend to the realms of cybercrime and cyberdefense. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to IT and cybersecurity professionals’ opinions on which side of the cybersecurity fight (i.e., adversaries or defenders) will benefit the most from GenAI, especially because organizational size and industry appear to influence their perspectives.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Generative AI Governance Programs at Enterprises

    Teams across business lines and industries are excitedly ramping up generative AI (GenAI) initiatives in the pursuit of competitive advantage, operational efficiency, and more. However, this fast-paced technology deployment has cybersecurity and governance teams racing to keep up with GenAI use. Recent research by TechTarget’s Enterprise Strategy Group took stock of how these teams view GenAI technology and where they stand with implementing strong governance measures around it.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (January 2024 – June 2024) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM. In this report you will find:

    ·The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.

    ·The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.