Next Steps for Application Security – Part 1 Steve Piper / April 11, 2018 / Market Research Every year when we publish the Cyberthreat Defense Report (2018 edition here), we highlight a handful of emerging (or significantly evolving) areas/technologies we believe have… Read More >
Container Security 101 ... and Beyond Steve Piper / October 17, 2017 / Market Research In the midst of developing the survey instrument for the 2018 edition of the Cyberthreat Defense Report (prospectus here), I find myself thinking about one… Read More >
Security Technology Face-Off Steve Piper / October 10, 2017 / Market Research As we gear up for the 2018 edition of the Cyberthreat Defense Report (prospectus here), I’m reminded of two “emerging” technologies we highlighted in the… Read More >
“Hotspots” from 2015 Cyberthreat Defense Report – Part 1 Steve Piper / March 11, 2015 / Market Research CyberEdge Group’s second annual Cyberthreat Defense Report surfaced a number of emerging areas of interest that we believe will warrant close attention from IT security… Read More >
2015 Cyberthreat Defense Report Infographic Steve Piper / March 11, 2015 / Market Research The following infographic summarizes key results from our 2015 Cyberthreat Defense Report. To download the full report, visit https://cyberedgegroup.com/cdr-2015. Read More >
“Hotspots” from 2015 Cyberthreat Defense Report – Part 2 Steve Piper / March 11, 2015 / Market Research In part 1 of our 2015 Cyberthreat Defense Report blog, next-generation endpoint defenses and threat intelligence services were introduced as two emerging areas of interest… Read More >
Long Live Endpoint Security! Steve Piper / June 28, 2014 / Market Research Palo Alto Networks’ acquisition of Cyvera earlier this year got me thinking about the evolution of endpoint defenses. It’s been obvious for quite some time… Read More >
Insights and Observations from the 2014 Verizon Data Breach Investigations... Steve Piper / April 23, 2014 / Industry News & Events Like its predecessors, the 2014 Verizon Data Breach Investigations Report (DBIR) is a treasure trove of real-world information about the cyberthreat landscape. A big change… Read More >
RSA Conference 2014 — The Year of ??? Steve Piper / March 5, 2014 / Industry News & Events Once again, I made the pilgrimage to San Francisco for the RSA Conference (Feb 24-28). In many ways, the 2014 edition was the same as… Read More >