Cybersecurity

  • The State of Identity Security

  • Operationalizing Encryption and Key Management

  • Businesses today are using every tool available to boost productivity and gain an edge in their highly competitive markets. Against this backdrop of demands for high output from every business line, developers are turning to third-party code, including open source software (OSS), to save time and build their applications faster. Recent research by TechTarget’s Enterprise Strategy Group showed that this tactic is increasingly popular for developers across industries, though it may pose challenges even as it solves efficiency problems.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Vulnerabilities to cyberattacks across the software supply chain plague today’s cybersecurity teams. From attacks targeting the open source software (OSS) in their code to cloud misconfigurations and stolen secrets, a variety of attack vectors means approaches to software supply chain security must be multifaceted. Recent research by TechTarget’s Enterprise Strategy Group examined these trends to find out where organizations are in their journey to a comprehensive software supply chain security strategy.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As organizations across industries seek to gain a competitive advantage by efficiently delivering feature-rich applications to their customers, employees, and partners, their developers increasingly leverage third-party and open source code components. This saves time from having to build custom code but poses challenges for security teams, who need to know the inventories of their applications—including all the software components, dependencies, and metadata in the applications—to effectively manage risk and rapidly respond to threats or attacks. As attacks have often targeted the software supply chain, regulations increasingly call for a software bill of materials (SBOM) to proactively mitigate software supply chain risk. Recent research by TechTarget’s Enterprise Strategy Group examined how organizations are using SBOMs and how they can best use SBOMs for effective software supply chain security.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The State of Cloud Security Platforms and DevSecOps

    Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging Kubernetes to automate deployment. However, security teams are struggling to keep up. Consequently, organizations are more broadly adopting DevSecOps practices that incorporate security into development processes to reduce the security misconfigurations deployed to the cloud. Additionally, organizations are looking to leverage platforms procured from a smaller set of vendors to realize a unified cybersecurity posture across distributed cloud environments. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, The State of Cloud Security Platforms and DevSecOps.

  • The State of Cloud Security Platforms and DevSecOps

    Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging Kubernetes to automate deployment. However, security teams are struggling to keep up, resulting in security incidents that cause application downtime, unauthorized access, data loss, and compliance fines. Consequently, organizations are more broadly adopting DevSecOps practices that incorporate security into development and DevOps processes to reduce the security misconfigurations deployed to the cloud and more quickly mitigate security issues when they are found in running applications. Additionally, organizations are looking to leverage suites and platforms procured from a smaller set of vendors or even a single vendor to reduce complexity and realize a unified cybersecurity posture across distributed cloud environments.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 374 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating or purchasing cloud security technology products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on the volume and distribution of sensitive data, the most important data to protect, the automation of sensitive data discovery, data classification strategies, data-resilience perceptions and strategies, data security posture management strategies, data-resilience stakeholders, and spending plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Emily Marsh

  • Christian Perry

  • The State of Identity Security

    Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so. Unfortunately, organizations have been slow to pivot their security programs to an approach that incorporates identities as a foundational aspect of their cybersecurity strategy. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals responsible for or involved with identity security technologies and processes to gain insights into these trends.

    To learn more about these trends, download the free infographic, The State of Identity Security.

  • Organizations continue to rely on identities that are susceptible to compromise, abuse, misuse, and theft. Risk is compounded by over-permissive, static access rights that provide little to no visibility into access trends or, most importantly, who is accessing what and how they are doing so.

    Despite the transformation to a dynamic, amorphous perimeter, a multitude of identity security solutions and managed identity services exist. Unfortunately, organizations have been slow to pivot their security programs to an approach that incorporates identities as a foundational aspect of their cybersecurity strategy.

    However, CISOs and security professionals are beginning to understand the importance of securing identities. With a decade of evidence on the risks and a plethora of identity security solutions, identity is shifting from the domain of IT operations into cybersecurity.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 372 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for or involved with identity security technologies and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.