Cybersecurity

  • DSPM comprises technology and processes that continuously monitor and assess an organization’s data security controls across all infrastructure, including on-premises data centers and private and public cloud environments. Recent data resilience research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to DSPM solution deployment and top use cases. While DSPM tools are relatively quick to deploy compared to other security technologies, organizations need to consider the people, process and technology when implementing DSPM and ensure they strategically plan an approach that will meet future needs to support scale and innovation, including usage of AI and generative AI (GenAI).

    To learn more, download the free brief, Streamlining Data Security Posture Management (DSPM) Implementations.

  • Generative AI (GenAI) is a technology teeming with possibilities, and those extend to the realms of cybercrime and cyberdefense. Recent research by TechTarget’s Enterprise Strategy Group revealed some interesting findings when it comes to IT and cybersecurity professionals’ opinions on which side of the cybersecurity fight (i.e., adversaries or defenders) will benefit the most from GenAI, especially because organizational size and industry appear to influence their perspectives.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Generative AI Governance Programs at Enterprises

    Teams across business lines and industries are excitedly ramping up generative AI (GenAI) initiatives in the pursuit of competitive advantage, operational efficiency, and more. However, this fast-paced technology deployment has cybersecurity and governance teams racing to keep up with GenAI use. Recent research by TechTarget’s Enterprise Strategy Group took stock of how these teams view GenAI technology and where they stand with implementing strong governance measures around it.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • Discover what’s trending on our network to engage IT buyers in market now and improve marketing and sales effectiveness. This report covers trending areas of interest across 240+ IT markets over the last 6 months (January 2024 – June 2024) in five (5) regions across the TechTarget & BrightTALK network: WW, NA, EMEA, APAC, LATAM. In this report you will find:

    ·The top 20 broad technology markets driving the most activity in the past 6 months. Activity data can help show where audience research is growing or declining and therefore help reinforce which markets are on the rise or declining.

    ·The top 25 granular topics growing the most across the TechTarget and BrightTALK network in the last 6 months. This gives insight into the content areas that are on the rise right now to leverage in your conversations.

    Already an Enterprise Strategy Group client? Log in to read the full report.

    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • The State of Identity Security

  • Operationalizing Encryption and Key Management

  • Businesses today are using every tool available to boost productivity and gain an edge in their highly competitive markets. Against this backdrop of demands for high output from every business line, developers are turning to third-party code, including open source software (OSS), to save time and build their applications faster. Recent research by TechTarget’s Enterprise Strategy Group showed that this tactic is increasingly popular for developers across industries, though it may pose challenges even as it solves efficiency problems.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Vulnerabilities to cyberattacks across the software supply chain plague today’s cybersecurity teams. From attacks targeting the open source software (OSS) in their code to cloud misconfigurations and stolen secrets, a variety of attack vectors means approaches to software supply chain security must be multifaceted. Recent research by TechTarget’s Enterprise Strategy Group examined these trends to find out where organizations are in their journey to a comprehensive software supply chain security strategy.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As organizations across industries seek to gain a competitive advantage by efficiently delivering feature-rich applications to their customers, employees, and partners, their developers increasingly leverage third-party and open source code components. This saves time from having to build custom code but poses challenges for security teams, who need to know the inventories of their applications—including all the software components, dependencies, and metadata in the applications—to effectively manage risk and rapidly respond to threats or attacks. As attacks have often targeted the software supply chain, regulations increasingly call for a software bill of materials (SBOM) to proactively mitigate software supply chain risk. Recent research by TechTarget’s Enterprise Strategy Group examined how organizations are using SBOMs and how they can best use SBOMs for effective software supply chain security.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • The State of Cloud Security Platforms and DevSecOps

    Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging Kubernetes to automate deployment. However, security teams are struggling to keep up. Consequently, organizations are more broadly adopting DevSecOps practices that incorporate security into development processes to reduce the security misconfigurations deployed to the cloud. Additionally, organizations are looking to leverage platforms procured from a smaller set of vendors to realize a unified cybersecurity posture across distributed cloud environments. TechTarget’s Enterprise Strategy Group recently surveyed IT, cybersecurity, and application development professionals to gain insights into these trends.

    To learn more about these trends, download the free infographic, The State of Cloud Security Platforms and DevSecOps.

  • The State of Cloud Security Platforms and DevSecOps

    Facing demands to increase productivity and scale, organizations are moving to cloud-native application development and delivery leveraging Kubernetes to automate deployment. However, security teams are struggling to keep up, resulting in security incidents that cause application downtime, unauthorized access, data loss, and compliance fines. Consequently, organizations are more broadly adopting DevSecOps practices that incorporate security into development and DevOps processes to reduce the security misconfigurations deployed to the cloud and more quickly mitigate security issues when they are found in running applications. Additionally, organizations are looking to leverage suites and platforms procured from a smaller set of vendors or even a single vendor to reduce complexity and realize a unified cybersecurity posture across distributed cloud environments.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 374 IT, cybersecurity, and application development professionals at organizations in North America (US and Canada) responsible for evaluating or purchasing cloud security technology products and services.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on the volume and distribution of sensitive data, the most important data to protect, the automation of sensitive data discovery, data classification strategies, data-resilience perceptions and strategies, data security posture management strategies, data-resilience stakeholders, and spending plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.