Skip to content
  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on November 25, 2022June 10, 2023

The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-based Channels – white paper and webinar

Presents new findings that explore the changing threat landscape for email, web, and cloud apps, and what organizations must do to bolster security protections for these channels. Commissioned by Perception Point.

Posted on October 26, 2021December 8, 2021

False Sense of Security — Shadow Code Remains a High Risk – Webinar

Learn how to secure your modern web applications from supply-side attacks to avoid the risk of a data breach, ensure data privacy and comply with regulations. Webinar hosted by PerimeterX on October 26, 2021.

Posted on September 22, 2021April 21, 2022

Shadow Code: The Hidden Risk to Your Website – White Paper

Research into the hidden risks that organizations face from the unmanaged use of Shadow Code on their websites. Commissioned by PerimeterX.

Posted on September 17, 2019May 7, 2021

Third-Party Code: The Hidden Risk in Your Website – White Paper

Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX.

Resources by Type

White Papers

Webinars

Survey Reports

Interviews

Podcast Episodes

Infographics

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Artificial Intelligence
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2023 Osterman Research

 

Loading Comments...