Our Information Security, Application Security 2022 study examines which application security solutions are implemented in enterprises, and which characteristics of application security testing are seen…
Our Information Security, Security Operations 2022 survey takes a look at trends in security operations (SecOps) technologies and services. It extends our prior research on…
2021 was a record-smashing year for overall cybersecurity M&A, and the first quarter of 2022 started off on a similar – albeit slightly less eye-popping…
Re-evaluating information security architecture to accommodate the emerging hybrid workforce, while resuming security initiatives disrupted in the rush to support off-site workers during the pandemic,…
Even in a downturn, information security spending is still holding up. Budgets for other tech sectors and even general corporate expansion may be facing cuts,…
As security industry analysts, we typically don’t focus on particular attack types or threat actors as much as we study the offerings to confront these challenges brought…
The Strengthening American Cybersecurity Act of 2022 was signed by President Joe Biden on March 15. The primary takeaway of the Act is that organizations…
The US does not currently have an overarching federal data privacy and protection law, despite broad bipartisan consumer support for such regulation. California, with its…
While not at quite the same fever pitch as ‘Zero Trust’ or ‘SASE’ (Secure Access Service Edge), the cybersecurity industry conversation around extended detection and…
Intuitive designs are marketing machines that make websites and apps more interactive, which can sometimes verge into regulatory risks when dark patterns are used to…