Skip to content
  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on February 9, 2023February 16, 2023

Navigating the SaaS Landscape: A Survey of Security Leaders on Security Strategies – White Paper

Learn about the tools, processes, and frameworks security leaders have implemented to address vulnerabilities in SaaS applications. Commissioned by Obsidian Security.

Posted on April 21, 2022April 21, 2022

Phishing, BEC, and Ransomware Threats for Microsoft 365 Users – White Paper

Results of a market survey of security managers at organizations in the United States and United Kingdom using Microsoft 365 about phishing, business email compromise, and ransomware attacks. Commissioned by Cyren.

Posted on January 18, 2022January 19, 2022

How to Deal with Business Email Compromise – White Paper

Explores how well organizations are prepared to address the threat of business email compromise. Highlights low readiness by many organizations today across people, process, and technology solutions. Sponsored by Mimecast, RPost, and SonicWall.

Posted on October 26, 2021December 8, 2021

False Sense of Security — Shadow Code Remains a High Risk – Webinar

Learn how to secure your modern web applications from supply-side attacks to avoid the risk of a data breach, ensure data privacy and comply with regulations. Webinar hosted by PerimeterX on October 26, 2021.

Posted on September 23, 2021April 21, 2022

Managing Risk from Subsidiaries: Goals, Friction, and Failure – White Paper

Research into how well large companies manage risk from subsidiaries, what difficulties they encounter, and the ramifications of these. Commissioned by CyCognito.

Posted on September 22, 2021April 21, 2022

Shadow Code: The Hidden Risk to Your Website – White Paper

Research into the hidden risks that organizations face from the unmanaged use of Shadow Code on their websites. Commissioned by PerimeterX.

Posted on September 15, 2021September 20, 2021

Exposing Software Supply Chain Security Blind Spots – Webinar

Presenting the findings of our recent report on security blind spots in the software supply chain. Webinar hosted by GrammaTech.

Posted on August 24, 2021September 20, 2021

Critically Vulnerable Open Source Code Found in COTS Apps – Interview

Discussing the findings on vulnerable open-source components in commercial off-the-shelf software. A conversation between Deb Radcliff for GrammaTech’s Shift Left Academy and Michael Sampson from Osterman Research.

Posted on October 30, 2020March 18, 2021

Better Ways to Deal with New Security Threats – White Paper

Exploring the dynamics of the new threat landscape, and highlighting new security solutions and practices that go beyond the capabilities of conventional solutions. Sponsored by Anomali, BIO-Key International, MDaemon Technologies, Virsec and VMware Carbon Black.

Posted on April 9, 2020September 29, 2021

A Conversation About New Security Threats Arising from the COVID-19 Crisis with Stu Sjouwerman, CEO of KnowBe4 – Podcast

A discussion with Stu Sjouwerman, CEO of KnowBe4, exploring how bad actors are exploiting the COVID-19 crisis.

Posts navigation

Older posts

Resources by Type

White Papers

Survey Reports

Webinars

Podcast Episodes

Infographics

Interviews

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2023 Osterman Research

 

Loading Comments...