Osterman Research is frequently quoted in the press. Here’s our collection of press mentions this year. PUBLICATIONDATEARTICLEAugust 2022BusinessWire4Osterman Research Survey Finds 84% of Companies Have Only Rudimentary Capabilities for Securing Their Cloud InfrastructureHelpNet Security4Businesses lack visibility into run-time threats against mobile apps and APIsJuly 2022IDM29Is Microsoft for Information Governance Enough?Security Boulevard26How to Select the Right MDR ServiceSecurity Boulevard26Tackling Data Sprawl in the CloudBusinessWire14Approov and Osterman Research Issue “The State of Mobile App Security in 2022”Business Chief9Are your employees using apps in the shadow IT universe?Security Magazine6Cybersecurity teams and employees disagree on shadow IT useSecurity Boulevard6Why the Rush to MDR?Security Brief1New study reveals 51% of employees using unauthorised appsJune 2022Security Boulevard28Should You Outsource or Manage Security In-House?BusinessWire27Cerby Launches With World’s First Security Platform for Unmanageable ApplicationsCSO Online27Security startup Cerby debuts with platform to manage shadow ITDarkReading2480% of Legacy MSSP Users Planning MDR UpgradeMSSP Alert22Security Alert Overload Propels Big Outsourcing Shift to MDR ServicesIT World Canada22Become a successful security organization built for tomorrowBusinessWire21New Research Report Highlights Significant Shift to Managed Detection and Response (MDR) ServicesSC Media6Build security awareness into the company’s cultureMay 2022BusinessWire19Approov Runtime Secrets Protection Shields Mobile App Secrets, Prevents Theft of API Keys and Credentials, Blocks Mobile App DDoS AttacksERP Solutions Review18How SBOMs Reduce Software Procurement Risk and Improve Enterprise SecuritySecurity Boulevard18Strata Identity Proposes Standard to Simplify Identity ManagementStreetInsider16Cyren Announces First Quarter 2022 Financial ResultsBetaNews12Enterprises struggle to discover cloud access policiesBusinessWire12Strata Identity Report Finds Most Enterprises Will Use Three or More Clouds in 12 Months, but Only 25% Can Discover Access PoliciesSee also Yahoo! and AP NewsBetaNews6Microsoft 365 targeted as businesses struggle to block email threatsTeiss4Why do British companies face a greater risk of email breaches?CyberNews1Michael Sampson, Osterman Research: “a significant proportion of organizations are not sufficiently proactive”April 2022 VentureBeat22Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacksFinTech Futures21Osterman Research report: privacy compliance in the US, status and progress in 2022ThreatPost20Most Email Security Approaches Fail to Block Common ThreatsAccesswire20New Global Research Reveals that 90 Percent of Organizations Have Suffered One or More Successful Email Breaches in the Last 12 MonthsGlobeNewswire19PerimeterX Code Defender Extends Capability To Stop Supply Chain AttacksMarch 2022Embedded11Top three tips for ensuring software supply chain securityFastCompany7Why training is essential to building a strong cybersecurity cultureJanuary 2022MarketScreener20Biden Aims to Drive Zero-Trust Architecture NationwideHelpNet Security20GrammaTech CodeSentry 3.0 improves software supply chain securityHelpNet Security20TAC Security ESOF VMDR offers vulnerability management coverage in a single platformYahoo! Finance19GrammaTech CodeSentry Enhances Software Bill of Materials Capabilities to Improve Software Supply Chain SecuritySecurity Boulevard17Anti Data Exfiltration versus Endpoint SecurityData Center Knowledge11Log4Shell Vulnerability Highlights Software Supply Chain Issues