Osterman Research is frequently quoted in the press. Here’s our collection of press mentions this year.

PUBLICATIONDATEARTICLE
September 2021
SCMedia23The parent company trap: Subsidiaries hide sources of cyber risk
MSSP Alert23Enterprises with Multiple Subsidiaries Face Greater Risk of Cyber Attacks
Yahoo! Finance23New CyCognito Report Reveals Subsidiaries are Global Enterprise Achilles Heel; Increasing Attack Surface and Exposure Drawing in Attackers
BollyInside22PerimeterX Third Annual Analysis Report Reveals False Sense of Security
Security Magazine22Shadow Code remains a high security risk
BusinessWire21False Sense of Security — Third Annual PerimeterX Report Reveals that Shadow Code Remains a High Risk
PRWeb21ActiveNav Launches Data Mapping as a Service to Help Privacy and Compliance Teams Shine a Light on Sensitive Data Hotspots
Security Boulevard20A Look Inside the Shadow Code Risk
BusinessWire16GrammaTech Selected SINET16 Award Winner
Market Screener15Mimecast : Ransomware Drives Demand for Managed Security Services
Security Intelligence10How Companies Can Prepare for Botnet Attacks on APIs
August 2021
Aerospace Manufacturing and Design30Open-source software vulnerabilities
Beta News20Ensuring compliance takes a front seat when using collaboration tools
Gulf News17It is time businesses looked closely at emails as their weakest link
Security Intelligence165 Ways to Defend Against Supply Chain Cyberattacks
MeriTalk9Study Finds Vulnerabilities in COTS Open-Source Components
Nextgov5Report Draws Attention to Vulnerabilities in Commercial-Off-the-Shelf Products
TechNewsWorld4Study Finds 100% of Commercial Apps Contain Security Flaws
LinuxInsider4Study Finds 100% of Commercial Apps Contain Security Flaws
BusinessWire4Osterman Research Software Supply Chain Study Finds 100 Percent of Commercial Applications Contain Vulnerable Software Components
Security Boulevard3Website Risk Analyzer Finds Threats in Your Third Party Code
July 2021
JD Supra29Does Teams Work Make the Dreams Work? Or Does it Create Information Governance and Compliance Nightmares?
Security Boulevard29Elevating Web App Security to a National Priority
HelpNet Security19Half of organizations are ineffective at countering phishing and ransomware threats
Marketing Dive15Google begins supporting email authentication protocol to guard against phishing
IDM15Compliance for Microsoft Teams – Reclaim the Driver’s Seat
Taiwan News1384% of Organizations Experienced Phishing & Ransomware Type Threats in the Past 12 Months
ITPro1384% of Organizations Experienced Phishing or Ransomware Attacks in the Last Year
ITProToday8Building an Effective Cybersecurity Culture
June 2021
The Register25‘What are the odds someone will find and exploit this?’ Nice one — you just released an insecure app
GlobeNewswire23PerimeterX Code Defender Named Best Security Solution by the 2021 SIIA CODiE Awards
HelpNet Security3It’s time to stop ransomware in its tracks
May 2021
CSO Online25Tailor security training to developers to tackle software supply chain risks
IDM21Study Identifies Microsoft Teams Data as Compliance Concern
GlobeNewswire20Study Identifies Microsoft Teams Data as a Source of Compliance Concern Among IT Leaders
E&T20Was Your Disaster Recovery Plan Ready for a Pandemic?
HelpNet Security19Endpoint security: How to shore up practices for a safer remote enterprise
The Daily Swig14Shift Right: Developers Knowingly Release Insecure Applications, Says Report
Security Boulevard14What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware
Security Boulevard1381% of Developers at Large Organizations Admit to Knowingly Releasing Vulnerable Applications
SC Magazine13Developers knowingly push flawed code, doubt build environments are secure
April 2021
Virtualization Review16Misconfigurations Continue to Plague Cloud Security, New Reports Say
Digital Journal15Why Security Awareness Training is a Top Cybersecurity Investment for Business
Security Boulevard13Osterman Research: Almost One-Third of US Companies Under-Resourcing Cloud Security Despite Escalating Risks
SC Media1Offboarding Tips Will Prevent Employee Data Theft When People Leave the Company
March 2021
Security Boulevard30You Want to Know How to Stop Phishing for Good. Hint: It’s Not a Silver Bullet
Harvard Business Review9Cyberattacks Are Inevitable. Is Your Company Prepared?
February 2021
Business 2 Community17What You Need to Know About Remote Employee Monitoring Software
HelpNet Security13Employees Aware of Privacy Risks, But Unsure of How They Affect the Workplace
January 2021
Security Boulevard28App Security Takes a Back Seat in the Drive to Digital Transformation
Professional Security Magazine Online25Web Application Security Report
Business 2 Community22Employee Offboarding: How to Keep Data Safe During a Termination
HelpNet Security22Organizations Struggle to Maintain Application Security Across Platforms
PR Wire21Radware research shows API abuse is a leading threat – and enterprises are unprepared for bot traffic
ContinuityCentral.com21Will APIs be the gateway to effective cyber attacks in 2021?
ITProPortal21Most Security Staff Have Little Say In App Security
SC Media20Reliance on cloud, APIs create confusion and introduce risk into software development
Security Magazine20API Abuse is a Leading Cyber Threat
Security Boulevard12Digital Transformation and the Shadow Code Risk