Skip to content
  • Home
  • What We Do
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on October 26, 2021December 8, 2021

False Sense of Security — Shadow Code Remains a High Risk – Webinar

Learn how to secure your modern web applications from supply-side attacks to avoid the risk of a data breach, ensure data privacy and comply with regulations. Webinar hosted by PerimeterX on October 26, 2021.

Posted on September 22, 2021April 21, 2022

Shadow Code: The Hidden Risk to Your Website – White Paper

Research into the hidden risks that organizations face from the unmanaged use of Shadow Code on their websites. Commissioned by PerimeterX.

Posted on September 17, 2019May 7, 2021

Third-Party Code: The Hidden Risk in Your Website – White Paper

Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX.

Resources by Type

White Papers

Survey Reports

Upcoming Webinars

Webinars

Podcast Episodes

Infographics

Interviews

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2022 Osterman Research

 

Loading Comments...