Business Email Compromise (BEC) scams are expected to explode in volume and profitability as attacks bypass traditional safeguards. Research on trends and tactics in BEC attacks, including variants, target victims, and precursor channels. Published March 2023.
Examines the investment priorities for cybersecurity by CISOs and CIOs in 2023, covering priorities to improve overall posture and a specific focus on four investment areas (apps, cloud, data, and on-premises infrastructure). Sponsored by BlackFog, Cerby, OpenText Cybersecurity, Quest, and SonicWall.
Learn about the tools, processes, and frameworks security leaders have implemented to address vulnerabilities in SaaS applications. Commissioned by Obsidian Security.
Presents new findings that explore the changing threat landscape for email, web, and cloud apps, and what organizations must do to bolster security protections for these channels. Commissioned by Perception Point.
Quantifies the direct costs borne by organizations in mitigating the phishing threat, and explores expectations about how phishing will change over the next 12 months. Commissioned by IRONSCALES.
Discusses eight areas where many organizations remain susceptible to ransomware attacks, outlines new and emerging solutions or approaches that can be used to bolster controls and protections, and offers a report card for self-assessment by organizations. Sponsored by Asigra, BlackFog, Cyren, Infoblox, IRONSCALES, Micro Focus, SonicWall, and Trend Micro.
The security challenges and weaknesses facing organizations hosting applications across multiple cloud providers. Commissioned by Radware.
Discussion between Micro Focus and Osterman Research on best practices for information governance. Webinar hosted by Micro Focus on August 25, 2022.
Presentation by Osterman Research and Ermetic of the key findings from the state of cloud security maturity research project. Hosted by Ermetic on August 17, 2022.
Investigation into the value of collaborative secure learning for training machine learning models, including examples from cybersecurity, financial services, and healthcare. Commissioned by Duality Technologies.