drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Fall 2026 Call for Presentations
    • DRJ Fall 2026
    • DRJ Scholarship
    • Tracey Rice Memorial Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • DRJ Glossary of Business Continuity Terms
    • Careers
    • The BCI Partnership
  • ABOUT
    • About DRJ
    • 2026 Media Kit
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee

Intruder Releases the Security Middle Child Report, Revealing How the Cybersecurity Industry Is Leaving Midmarket Businesses Behind

by Jon Seals | March 13, 2026 | | 0 comments

Research of US and UK Midmarket Cybersecurity Leaders Showcases How Midmarket Organizations Project Cyber Confidence, But Many Teams Are Stretched and Lack Appropriate Solutions

  • 94% are confident in their ability to identify and remediate critical risks before attackers exploit them, but there are cracks underneath that confidence. For example, 42% describe their team as either stretched, overwhelmed or consistently behind
  • 46% say enterprise platforms assume more staff, budget, or complexity than they can support and 29% say SME tools no longer meet their needs. They’re not failing to use the right tools as the right tools largely don’t exist for them
  • 51% of respondents say it would take approximately a week to assess their exposure to a critical zero-day. In a threat landscape where exploitation can follow disclosure within 24-48 hours, a week is too long

LONDON – Intruder, a leader in exposure management, today released its Security Middle Child Report, which uncovered that almost half of cybersecurity leaders at midmarket businesses, e.g. companies with at least $50M revenue and between 400-6000 employees, say they don’t have the right technology solutions, leaving them stuck in what Intruder calls the “security middle child problem.” 46% say enterprise platforms assume more staff, budget, or complexity than they can support and 29% say SME tools no longer meet their needs. As a result of these poor fits, 42% describe their teams as either stretched, overwhelmed or consistently behind.

Midmarket companies represent a core component of the US economy. JP Morgan Chase & Co. estimates that segment consists of approximately 300,000 businesses generating $13T in annual revenue and employs over 40 million people within the US alone. Despite its importance, Intruder’s research shows how the cybersecurity vendor market is not adequately serving the midmarket — leaving teams with limited visibility into what’s exposed (28%), too many tools to navigate (26%), and struggling to prioritize (24%).

“Midmarket companies are being treated as the middle child when it comes to cybersecurity solutions. They are overlooked by vendors focused on Fortune 500s or SMBs, while they are just as important and just as vulnerable to attackers,” said Chris Wallis, CEO and founder of Intruder. “This is a structural problem, the majority of solutions available to midmarket security teams were never built for the position they’re now in.”

Cybersecurity leaders claim to feel confident and in control, but cracks are showing

Midmarket security leaders defy the stereotype of an overworked, underfunded team. 89% report increasing budgets. Around 70% say headcount has kept pace with their digital estate. 64% feel their posture scaled appropriately with growth. 94% are confident in their ability to identify and remediate critical risks before attackers exploit them while 51% are “very confident.”

But dig beneath those numbers and cracks appear. 65% of C-suite respondents are very confident in their ability to catch critical threats, but that drops sharply among those closer to the actual work: Directors at 55%, Senior Managers at 46%, and Middle Managers at 35%. The further you are from the coalface, the more confident you are.

One major concern is that 51% of respondents say it would take approximately a week to assess their exposure to a critical zero-day. In a threat landscape where exploitation can follow disclosure within 24-48 hours, a week is too long.

Midmarket digital estates are growing while teams are feeling strained

91% of respondents say their digital estate grew over the past 24 months and 38% say it grew significantly. While many teams responsible for securing that estate are growing with it, a large portion are lagging behind: only 30% of organizations grew headcount faster than their digital estate, 17% grew more slowly, and nearly 10% stayed flat. That gap has a human cost. 41% reported their teams are dealing with feelings of strain: 21% say they are stretched but coping, 11% feel overwhelmed and stuck in a reactive mode, and 9% are consistently behind and exposed.

36% of respondents acknowledge their security posture hasn’t scaled appropriately with digital estate growth. For 14%, that gap won’t close for at least another six months. However, only 17% are prioritizing headcount this year. The dominant investment priorities are AI and automation (49%) and adding new solutions (33%) — suggesting security leaders are reaching for technology to compensate for people.

The data suggests this isn’t working: 44% describe a stack that is either outgrown or fragmented.

The pressure isn’t evenly distributed. Healthcare shows the most strain — only 51% kept headcount at pace with their digital estate, and 26% grew more slowly. In SaaS, that figure rises to 86%, with only 10% growing more slowly. The gap is striking in healthcare given the stakes involved.

Current tech solutions aren’t meeting their needs

44% of teams have either outgrown their stack or stitched it together from point solutions that don’t provide a unified view. This has a cost: 26% cite navigating too many security tools as a top challenge, 24% cite too many alerts with poor prioritization, and 20% cite the inability to measure and report on cyber hygiene. The stack isn’t just complex — it’s actively getting in the way. And with 33% planning to add more solutions this year, the fragmentation is likely to deepen.

Underpinning this is a vendor market that isn’t built for the midmarket. 46% say enterprise platforms assume more staff, budget, or complexity than they can support. 29% say SME tools no longer meet their needs. Midmarket teams aren’t failing to use the right tools. It’s that the right tools largely haven’t existed for them.

41% of respondents report using AI pentesting, and it appears in the top five most-adopted tools for fintech, manufacturing, and retail. Given the category only emerged 12-18 months ago, it’s unclear whether teams are using true AI pentesting or applying the term more loosely. But the intent is clear: nearly half (49%) cite AI and automation as their top investment priority for 2026, suggesting security leaders are looking to AI to help them do more with less.

That said, AI pentesting only breaks into the top five for organizations with $500M+ revenue — implying it’s currently most accessible to companies with the most resources. Adoption also increases with team size: 49% of organizations with 11+ security staff report using it, versus just 25% of teams with 2-5 people. For the smallest, most stretched teams AI is supposed to help, do existing solutions risk adding complexity rather than relieving pressure?

Cyber risk isn’t a boardroom conversation

Despite growing digital estates, an increasing frequency of high-profile breaches, and signs that security posture is struggling to keep pace, cyber risk remains largely below the boardroom. Only 9% discuss cyber risk at board level. 34% reach executive leadership. The majority (51%) keep it at security/IT leadership only, and 7% confine it to the security team alone.

“The data in this report doesn’t point to a single problem. It points to four compounding ones: estates growing faster than teams, confidence highest where visibility is lowest, stacks that are increasingly fragmented. And the relevant conversations aren’t reaching the people who need to hear it,” says Dan Andrew, head of security at Intruder. “Until that changes, the gap between how these teams present themselves and how they actually operate will keep widening.”

Organizations interested in reviewing the full Security Middle Child Report can find it for download here. Security and IT teams interested in learning more about the Intruder platform can book an introductory call here.

About This Survey

The research was conducted by Censuswide among 502 CISOs and equivalent decision makers (Managers, Directors, Leads, VPs and CISO-equivalents) surveyed across the UK (200) and US (302) between February 11–18, 2026, at organizations with 400-6,000 employees and at least $50 million revenue, across financial services, fintech, healthcare, manufacturing, professional services, retail and SaaS. Censuswide abides by and employs members of the Market Research Society and follows the MRS code of conduct and ESOMAR principles. Censuswide is also a member of the British Polling Council.

About Intruder

Intruder’s exposure management platform helps lean security teams stop breaches before they start by proactively discovering attack surface weaknesses. By unifying attack surface management, cloud security and continuous vulnerability management in one intuitive platform, Intruder makes it easy to stay secure by cutting through the noise and complexity. Founded in 2015 by Chris Wallis, a former ethical hacker turned corporate blue teamer, Intruder is now protecting over 3,000 companies worldwide. Learn more at https://intruder.io.

Q&A: Intruder’s Security Middle Child Report

Q: What is the Security Middle Child Report?

Intruder, a leader in exposure management, today released its Security Middle Child Report, a survey of over 500 CISOs and equivalent decision makers (Managers, Directors, Leads, VPs and CISO-equivalents) across the UK and US. It unveils how the cybersecurity vendor landscape isn’t built to meet midmarket enterprise needs. Almost half (41%) of cybersecurity leaders at midmarket enterprises describe their teams as stretched, overwhelmed or consistently behind. A major contribution to this issue is how they don’t have the right technology solutions to support themselves: 46% say enterprise platforms assume more staff, budget, or complexity than they can support and 29% say SME tools no longer meet their needs.

Q: What does the Security Middle Child Report uncover about midmarket cybersecurity leaders’ confidence?

Midmarket security leaders defy the stereotype of an overworked, underfunded team and project high levels of confidence while overseeing increasing budgets. But that may be a facade as research shows they have low visibility into crucial security needs, slow response times to critical zero-days and more.

Q: What does the Security Middle Child Report uncover about midmarket cybersecurity leaders’ technology investments?

89% report increasing budgets but it’s unclear if that money is invested wisely. Almost half are prioritizing AI/automation adoption, choosing new, untested technology over best-practices such as cyber hygiene training for non-cybersecurity employees (31%), professional development/certification/training for existing team members (28%) or increasing compliance & governance with new regulatory bodies (23.5%).

Q: What does the Security Middle Child Report uncover about midmarket cybersecurity leaders’ current cybersecurity technology stacks?

Midmarket security stacks are fragmented, with no clear consensus on what good looks like. No single tool breaks above 56% adoption. CSPM leads at 55%, followed by SIEM (47%), WAF (47%), DSPM (44%), and EDR/XDR (43%). Not only is the stack fragmented, it’s actively making the job harder. 24% of respondents cite too many alerts with poor prioritization as a top challenge, and 26% cite navigating too many security tools.

Q: What does the Security Middle Child Report uncover about midmarket companies’ prioritization of cybersecurity risks?

Despite growing digital estates and signs that security posture is struggling to keep pace, cyber risk remains largely below the boardroom. Only 9% discuss cyber risk at board level. 34% reach executive leadership. The majority (51%) keep it at security or IT leadership only, and 7% confine it to the security team alone. A lack of board reporting signals that most midmarket organizations haven’t yet connected cybersecurity to business risk.

Related Content

  1. Integration of Cybersecurity into Physical Security Realm
  2. Future-Proof Business Security: Strategies for Long-Term Resilience
    The Future of Business Protection
  3. Ways to Enhance Strategic Influence of Security Professionals Within Organization

Recent Posts

Cork Cyber Tackles the Dirty Data Problem Quietly Undermining MSP Cyber Programs with New Automated Mapping Feature

April 17, 2026

DuploCloud Strengthens Enterprise Trust Position with SOC 2 Type II and ISO/IEC 42001 Milestones

April 16, 2026

Keeper Security Launches Enterprise-Grade Approval Governance and Real-Time Visibility for Endpoint Privilege Management

April 16, 2026

ONEKEY: Vulnerability Management and SBOM Generation Are Key to CRA Compliance

April 16, 2026

Compliance Breakthrough at Dauphin Island leads to CRS Class Improvement

April 15, 2026

Fiverr Data Leak Exposes Sensitive Documents – Expert Commentary

April 15, 2026

Archives

  • April 2026 (38)
  • March 2026 (89)
  • February 2026 (76)
  • January 2026 (61)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2026
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Fall 2026 | Resilience In Motion

    Leave your details below for a chance to win a free pass to DRJ Fall 2026 | Resilience In Motion. The winner will be announced on July 30. Join us for DRJ's 75th Conference!
    Enter Now