At its re:Inforce security-focused event in June, Amazon Web Services announced several additions for key management, certificate authority, secure computing and payment security. These are…
The implications of workload mobility — moving workloads between venues, whether it be public or private cloud, colocation facilities, or on-premises datacenters — and the…
Our Information Security, Technology Roadmap 2023 study examines adoption, or plans for adoption, of various information security technologies and services, as well as spending plans…
Enterprises working with edge infrastructure and services are already devoting significant proportions of their IT infrastructure and services spending to edge, and most of those…
451 Research’s Information Security, Cloud Security 2022 study examines how enterprise information security programs are approaching securing the cloud, including cloud-specific security pain points and…
Our Information Security, Application Security 2022 study examines which application security solutions are implemented in enterprises, and which characteristics of application security testing are seen…
Our Information Security, Security Operations 2022 survey takes a look at trends in security operations (SecOps) technologies and services. It extends our prior research on…
2021 was a record-smashing year for overall cybersecurity M&A, and the first quarter of 2022 started off on a similar – albeit slightly less eye-popping…
Even in a downturn, information security spending is still holding up. Budgets for other tech sectors and even general corporate expansion may be facing cuts,…
While not at quite the same fever pitch as ‘Zero Trust’ or ‘SASE’ (Secure Access Service Edge), the cybersecurity industry conversation around extended detection and…