Cybersecurity

  • Operationalizing Encryption and Key Management

    The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. As a result, organizations are turning to encryption and future-proofed post-quantum encryption to maintain cyber resilience as well as to ensure data privacy and compliance.

    To learn more about these trends, download the free infographic, Operationalizing Encryption and Key Management.

  • Generative AI (GenAI) introduces new risks as employees connect to GenAI applications, share data, and build homegrown large language models. Security professionals are also anxious about how cybercriminals may use GenAI as part of attack campaigns. Despite these risks, generative AI holds great cybersecurity-boosting potential as well.

    To learn more about these trends, download the free infographic, Generative AI for Cybersecurity: An Optimistic but Uncertain Future.

  • This Complete Survey Results presentation focuses on securing the software supply chain, including the implications of using open source software (OSS), the types of software supply chain attacks organizations have experienced, and the types of security solutions in place to defend against or help mitigate these attacks.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Since the introduction of ChatGPT in November 2022, generative AI (GenAI) has been described as everything from a novelty and an economic boon to a threat to humanity. As this debate continued, GenAI took center stage at the RSA Conference 2023 with the introduction of and subsequent hoopla around Microsoft Security Copilot. Many other vendors have introduced similar capabilities since. Few would argue against the idea that GenAI (and AI in general) will have a profound impact on society and global economics, but in the near term, it introduces new risks as employees connect to GenAI applications, share data, and build homegrown large language models (LLMs) of their own. These actions will inevitably expand the attack surface, open new threat vectors, introduce software vulnerabilities, and lead to data leakage.

    Despite these risks, generative AI holds great cybersecurity potential. Generative AI could help improve security team productivity, accelerate threat detection, automate remediation actions, and guide incident response. These prospective benefits are so compelling that many CISOs are already experimenting with GenAI or building their own security LLMs. At the same time, security professionals remain anxious about how cybercriminals may use GenAI as part of attack campaigns and how they can defend against these advances.

    Have organizations embraced GenAI for cybersecurity today, and what will they do in the future? To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 370 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for cyber-risk management, threat intelligence analysis, and security operations, with visibility into current GenAI usage and strategic plans.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • This Complete Survey Results presentation focuses on how generative AI is helping frequently understaffed cybersecurity teams to analyze and prioritize decisions to mitigate cyber-risk as well as how adept cyber-defenders are at tracking AI-based threats and implementing the right countermeasures.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Operationalizing Encryption and Key Management

    The potential for serious business disruptions from breaches makes securing data critical. Ransomware, software supply chain compromise, and targeted penetration attacks are just some of the looming threats that can result in data loss, compliance violations, brand damage, and lost revenue. Additionally, ransomware actors are changing their tactics to focus on data extortion: holding exfiltrated data hostage to public exposure.

    As a result, organizations are turning to encryption to maintain cyber resilience in response to a successful data breach as well as to ensure data privacy and compliance. Although organizations understand how encryption protects data, they struggle with the implementation, specifically how encryption and key management solutions balance security, usability, performance, compatibility, and costs. Further compounding these problems is quantum computing’s potential to break current encryption capabilities, representing another challenge to securing sensitive data. Vendors need to demystify and simplify encryption and key management.

    To gain further insight into these trends, TechTarget’s Enterprise Strategy Group surveyed 387 IT, cybersecurity, compliance, and DevOps professionals at organizations in North America (US and Canada) involved with encryption and data security technology and processes.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from almost 700 global technology buyers of which 385 were Sr. IT or Business Leadership. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.

  • EMEA Tech Buyers Media Consumption Habits in 2024

    TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from 240 EMEA technology buyers across IT management and senior business roles. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • APAC Tech Buyers Media Consumption Habits in 2024

    TechTarget and Enterprise Strategy Group ran a global survey examining where buyers source information throughout their purchase journey. This report focuses on responses from 135 APAC technology buyers across IT management and senior business roles. Below are 5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • TechTarget and Enterprise Strategy Group ran a global survey examining where cybersecurity buyers source information throughout their purchase journey.

    5 insights you can learn from this report:

    • Media types B2B buyers rely on when building a vendor shortlist
    • Channels where B2B buyers are spending more time doing research
    • What buyers want from vendor content including what motivates them to attend webinars
    • Trends in vendor loyalty, including what causes customers to switch vendors/suppliers
    • What tech vendors need to do to maintain a strong ongoing relationship with their customers
    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • As ransomware attacks ravage data systems and operations across industries, data protection and cybersecurity leaders are finding that their recoverability falls short in the face of this threat. Recent research by TechTarget’s Enterprise Strategy Group finds most organizations have a long way to go in bringing ransomware service-level agreements (SLAs) in line with those of traditional recovery operations to protect their critical data assets and reputations.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.
  • Mitigating Ransomware Is a Business Imperative

    Ransomware has burdened data protection and cybersecurity professionals alike since its inception in the modern threat landscape. Recent research by TechTarget’s Enterprise Strategy Group showed that this now-mainstay threat is no longer an anxiety for only IT professionals tasked with managing its mitigation but also affects roles and lines of business throughout organizations that must combat it.

    Already an Enterprise Strategy Group client? Log in to read the full report.
    If you are not yet a Subscription Client but would like to learn more about accessing this report, please contact us.