![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/08/GettyImages-1400563623-1024x683.jpg)
It’s more important than ever to accurately assess underappreciated risk and threat vectors and to identify effective and efficient ways to address them.
Our latest research shows the average number of planned investments in Cybersecurity technology tops all other tech categories we studied.
We work closely with vendors and end users alike to stay up to date on how organizations are investing, what problems they’re trying to solve, and how the market is changing or adapting to the latest trends. Enterprise Strategy Group’s Cybersecurity analysts and research cover every aspect of an organization’s cybersecurity needs and lifecycle, including:
- Application security
- Cloud security
- Cyber risk management
- Data security
- Identity & access management
- Network security
- Security operations
- Threat detection & response
- User protection
Infographic
The Growing Complexity of Securing the Software Supply Chain
Many organizations are worried about having a high percentage of code that is open source within their software, expressing concerns about the specific possibility of being victims of hackers targeting popular/commonly used open source software. Organizations are challenged with increased vulnerability across the software supply chain and need effective security solutions that can support the […]
Analysts Covering Cybersecurity
![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/07/grady-john-540.png)
John Grady
Principal Analyst, Network Security & Web Application Security
Areas of Expertise
- Bot Mitigation
- CASB
- DDoS
- Firewall
- IPS
- Microsegmentation
![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/07/gruber-dave-540.png)
Dave Gruber
Principal Analyst, Ransomware, SecOps & Services
Areas of Expertise
- Data Leakage Prevention
- DevSecOps
- Extended Detection & Response
- Managed Detection & Response
- Ransomware Security Strategies
- Security Analytics
![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/07/knuth-gabe-540.png)
Gabe Knuth
Senior Analyst, End-user Computing & User Protection
Areas of Expertise
- Desktop & App Virtualization (VDI)
- Desktop-as-a-Service (DaaS)
- Digital Employee Experience (DEX)
- Digital Workspaces
- Email Security
- End-User Devices & Hardware
![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/07/marks-melinda-540.png)
Melinda Marks
Practice Director, Application & Cloud Security
Areas of Expertise
- API Security
- Application Security
- Cloud Security Posture Management
- Cloud Workload Protection Platforms
- Cloud-native Technologies
- Container Security
![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/07/mckenna-brian-540.png)
Brian McKenna
Senior Analyst, Business Applications & EMEA Analyst Services Director
Areas of Expertise
- Business & Technology Strategy
- Business Applications
- Business Intelligence
- Contact Center
- Customer Data Platforms (CDP)
- Customer Experience/CRM
![](https://www.techtarget.com/esg-global/wp-content/uploads/2023/07/tan-aaron-540.png)
Aaron Tan
Regional Director, Analyst Services, APAC
Areas of Expertise
- Application Modernization & DevOps
- Business Applications
- Cloud Computing
- Cybersecurity
- DevOps
- IaaS/Cloud
![](https://www.techtarget.com/esg-global/wp-content/uploads/2024/02/cropped-Todd-Thiemann-1.png)
Todd Thiemann
Senior Analyst, IAM & Data Security
Areas of Expertise
- Biometrics and Behavioral Analytics
- Data Protection
- Encryption & Key Management
- Identity & Access Management (IAM)
- Identity Threat Detection & Response
- Leveraging AI and ML to improve cybersecurity
![](https://www.techtarget.com/esg-global/wp-content/uploads/2024/02/David-Vance.png)
David Vance
Senior Analyst, Risk & Vulnerability Management
Areas of Expertise
- API Security
- Application Security Posture Management
- Application Security Testing
- Attack Surface Management (ASM)
- Cloud Native Application Protection Platforms
- Container Security
Recent Cybersecurity Insights
Research Report | July 15, 2024
The State of Identity Security: Opening Doors for the Right Entities and Locking Out the Bad Actors
Survey Results | June 27, 2024
The Life and Times of Cybersecurity Professionals Volume VII
Research Brief | June 27, 2024
The Emergence of Encryption Teams
Research Brief | June 27, 2024