Cyberthreat intelligence is getting crowded

Security Industry Market Trends, Predictions and Forecasts

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • 2013 Security 7 award winners revealed

    In this special issue, we are revealing the winners of our Security 7 awards. This is the ninth year we've handed out the Security 7 awards, which recognize outstanding information security professionals in seven sectors: education, health care, fina... 

  • Security Readers' Choice Awards 2013

    The winners of the Information Security Readers' Choice Awards 2013 are tallied, and presented in this issue. More than 1,000 readers voted for the best security products in 19 categories, including five new award categories this year: "Cloud ... 

  • Seven Outstanding Security Pros in 2012

    Find out who won this year’s Security 7 Award, which honors outstanding security professionals in seven vertical markets. Also in this issue, we examine the pros and cons of the Metasploit penetration testing framework, and ways to overcome cloud com... 

  • Security Readers' Choice Awards 2012: Your picks for the best security products

    In this issue, find out who won this year's Readers' Choice Awards. More than 2,100 readers participated this year, rating the best security products in 14 categories. The issue also features an article by Diana Kelley of SecurityCurve, who examines ... 

  • Spotlight on top security trends of 2011 and Security 7 award winners

    2011 has been an overwhelming year for security; complete with security breaches, subsequent attacks and an abundance of negative attention. This month’s edition of Information Security Magazine, brought to you by, is looking past ... 

  • The top 2011 security products: Information Security Readers' Choice Awards

    This month, we reveal the best security products in 14 different categories. Find out the best products for anti-malware, authentication, risk management, vulnerability management and more. 

  • Security 7 Award winners and the latest on effective security awareness

    We announce the winners of the sixth annual Security 7 Awards in this special issue. The award winners offer advice for tackling enterprise security challenges. Plus, learn how to set up an effective information security awareness program and find ou... 

  • 2010 Security Readers' Choice Awards

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which... 

  • Winners of Information Security magazine's Security 7 Award

    The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies h... 

  • 2009 Security Readers' Choice Awards

    This issue of Information Security Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 diff... 

  • See more Premium Content on Security Industry Market Trends, Predictions and Forecasts
  • Verizon Data Breach Investigations Report (DBIR)

    The Verizon Data Breach Investigations Report (DBIR) is an annual publication that provides data from and analysis of information security incidents, with a specific focus on data breaches. 

  • crisis management

    Crisis management is the application of strategies designed to help an organization deal with a sudden and significant negative event. A crisis can occur as a result of an unpredictable event or as an unforeseeable consequence of some event that had ... 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • backscatter body scanning

    Backscatter body scanning is an X-ray-based technology that yields a high-resolution image of a person's body beneath their clothing and reveals concealed objects... (Continued) 

  • intelligence community

    The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security. 

  • marketecture (or marchitecture)

    A marketecture (or marchitecture) is a high-level representation of software or hardware architecture designed with marketing requirements as a primary consideration. (Continued...) 

  • NCSA

    NCSA at the University of Illinois in Urbana, Illinois is the home of the first Web browser that had a graphical user interface. 

  • Palladium

    Palladium is a plan from Intel, AMD, and Microsoft to build security into personal computers and servers at the microprocessor level. 

  • IT-ISAC (Information Technology Information Sharing and Analysis Center)

    IT-ISAC (Information Technology Information Sharing and Analysis Center) is a facility founded in January, 2001 by nineteen prominent IT industry companies (including Oracle, IBM, EDS, and Computer Sciences) to serve as a central repository for secur... 

About Security Industry Market Trends, Predictions and Forecasts

Information security industry trends and forecasts from research firms and analysts, and predictions on hot technologies and market analysis futures from industry experts.