Osterman Research is frequently quoted in the press. Here’s our collection of press mentions this year.

PUBLICATIONDATEARTICLE
May 2022
BusinessWire19Approov Runtime Secrets Protection Shields Mobile App Secrets, Prevents Theft of API Keys and Credentials, Blocks Mobile App DDoS Attacks
Security Boulevard18Strata Identity Proposes Standard to Simplify Identity Management
StreetInsider16Cyren Announces First Quarter 2022 Financial Results
BetaNews12Enterprises struggle to discover cloud access policies
BusinessWire12Strata Identity Report Finds Most Enterprises Will Use Three or More Clouds in 12 Months, but Only 25% Can Discover Access Policies
See also Yahoo! and AP News
BetaNews6Microsoft 365 targeted as businesses struggle to block email threats
Teiss4Why do British companies face a greater risk of email breaches?
CyberNews1Michael Sampson, Osterman Research: “a significant proportion of organizations are not sufficiently proactive”
April 2022
VentureBeat22Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacks
FinTech Futures21Osterman Research report: privacy compliance in the US, status and progress in 2022
ThreatPost20Most Email Security Approaches Fail to Block Common Threats
Accesswire20New Global Research Reveals that 90 Percent of Organizations Have Suffered One or More Successful Email Breaches in the Last 12 Months
GlobeNewswire19PerimeterX Code Defender Extends Capability To Stop Supply Chain Attacks
March 2022
Embedded11Top three tips for ensuring software supply chain security
FastCompany7Why training is essential to building a strong cybersecurity culture
January 2022
MarketScreener20Biden Aims to Drive Zero-Trust Architecture Nationwide
HelpNet Security20GrammaTech CodeSentry 3.0 improves software supply chain security
HelpNet Security20TAC Security ESOF VMDR offers vulnerability management coverage in a single platform
Yahoo! Finance19GrammaTech CodeSentry Enhances Software Bill of Materials Capabilities to Improve Software Supply Chain Security
Security Boulevard17Anti Data Exfiltration versus Endpoint Security
Data Center Knowledge11Log4Shell Vulnerability Highlights Software Supply Chain Issues