Cybersecurity

  • This Complete Survey Results presentation focuses on the experiences of cybersecurity professionals, including performance assessments of their cybersecurity leaders and their suggestions for what organizations can do to help cybersecurity professionals succeed.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Emergence of Encryption Teams

    The risk of data breach exposing sensitive or confidential information has never been higher, with firms recognizing that their revenue and reputation are on the line. As a result, encryption for data in motion and at rest has become a mainstay technology for businesses conducting digital transactions. Recent research by TechTarget’s Enterprise Strategy Group suggests that assembling teams to support this important strategy provides organizations with a stronger cybersecurity posture.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The Post-quantum Cryptography Journey Has Started

    The National Institute of Standards and Technology (NIST) has begun the process of standardizing encryption algorithms designed to withstand attacks by quantum computers. While no quantum computers are currently capable of breaking existing encryption algorithms, that will eventually change as quantum computing evolves and matures. Recent research by TechTarget’s Enterprise Strategy Group investigated how organizations understand and manage post-quantum cryptography (PQC) technologies today in anticipation of the quantum future.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 Cloud Security Platforms and DevSecOps

    This Complete Survey Results presentation focuses on the scope of cloud-native application development environments, including the top challenges associated with securing cloud-native applications and the security solutions in place to protect cloud infrastructure and applications.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Security operations grow more difficult each year due to issues like the persistent threat landscape, a growing attack surface, and the volume and complexity of security alerts. Additionally, many SOC teams remain understaffed and lack advanced security operations skills. To address these challenges, CISOs are open to evaluating new technologies in areas like advanced analytics for threat detection and process automation for incident response. TechTarget’s Enterprise Strategy Group recently surveyed IT and cybersecurity professionals responsible for or involved with security operations technology and processes to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Race to Support Overwhelmed Security Teams With XDR and SOC Modernization.

  • Security operations grow more difficult each year due to issues such as the persistent threat landscape, a growing attack surface, and the volume and complexity of security alerts. Additionally, many SOC teams remain understaffed and lack advanced security operations skills. To address these challenges, CISOs are open to evaluating new technologies in areas like advanced analytics for threat detection and process automation for incident response.

    Additionally, many organizations have active initiatives to consolidate security operations tools. SOC technology consolidation and integration efforts are aimed at improving security efficacy, reducing operational overhead, and building a SOC technology architecture that can keep up with the pace and scale of hybrid IT.

    Threat detection and response priorities include operationalizing threat intelligence, improving the integration of asset management data with security operations, and improving alert triage and prioritization. This indicates that existing SOC operations activities are inadequate, and organizations will subsequently spend accordingly to address current limitations.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 374 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for or involved with security operations technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The State of Identity Security

    This Complete Survey Results presentation focuses on the scope, scale, and types of identities that IT and cybersecurity teams must manage, including the associated security requirements and challenges, the types of native identity security controls in use, and the individuals and groups responsible for securing identities.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Considering the multifaceted, constantly evolving threat landscape that today’s cybersecurity defenders contend with, it makes sense that many organizations opt to supplement internal skills with the expertise of third-party providers. Recent research by TechTarget’s Enterprise Strategy Group revealed that if they can get through the cacophony of incident response (IR) vendors and solutions available and select the right provider for their unique needs, organizations keeping such firms on retainer often fare better in IR than their counterparts who do not.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Improving Incident Response Posture

    Many organizations are struggling to operationalize incident response (IR) against a backdrop of expanding attack surfaces and a growing number of successful attacks. Recent research by TechTarget’s Enterprise Strategy Group revealed that challenges abound in these endeavors, with internal IR leadership and external service providers taking on nuanced roles in the process.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • 2024 XDR and SOC Modernization Trends

    This Complete Survey Results presentation focuses on the people, processes, and technology supporting security operations modernization, including key requirements and expectations for both managed services and products serving XDR usage and SOC modernization.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Many organizations are worried about having a high percentage of code that is open source within their software, expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used open source software. Organizations are challenged with increased vulnerability across the software supply chain and need effective security solutions that can support the demands of cloud-native development. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals responsible for evaluating, purchasing, and utilizing developer-focused security products to gain insights into these trends.

    To learn more about these trends, download the free infographic, The Growing Complexity of Securing the Software Supply Chain.

  • Software is increasingly composed of open source software (OSS), with the majority of organizations reporting it constitutes more than half of their code composition. While it saves time for developers when they can utilize existing third-party code to build and run their applications, security teams need to understand the software components to put the processes in place to secure the applications.

    Consequently, many organizations are worried about having a high percentage of code that is open source, with some expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used OSS. Organizations are challenged with increased vulnerability across the software supply chain and with understanding how to effectively mitigate risk in light of recent targeted attacks. Organizations need effective software supply chain security solutions that can support the demands of cloud-native development.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 368 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and utilizing developer-focused security products.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.