PUBLICATION | DATE | ARTICLE |
Baseline | December 28, 2015 | Managers on the Fence About Unified Communications |
Digital4 | December 23, 2015 | Shelfware: ecco come evitare di acquistare software inutile oinutillizzato |
DDaily | December 22, 2015 | [기고] 기업 CIO, 사내 개인용 솔루션 사용 전략 재점검 해야 |
Government Technology | December 17, 2015 | 5 Cyber-Risk Trends CIOs Should Keep in Mind for 2016 |
Business Wire | December 16, 2015 | ISACA Identifies Five Cyber Risk Trends for 2016 |
eWeek | December 13, 2015 | Retailers Lack Proper Security Control and Visibility, ReportFinds |
Information Management | December 9, 2015 | Retail Report Shows False Sense of Confidence Over DataSecurity |
CIO Insight | December 9, 2015 | How Retailers Jeopardize Security With Temps |
Business Solutions | December 9, 2015 | Retailers Face Security Holes This Holiday Shopping Season |
CSO Online | December 8, 2015 | Osterman study highlights false sense of security in the retailsector |
TechTarget (SearchSecurity) | December 8, 2015 | Temporary workers cause access management troubles over theholidays |
DARK Reading | December 8, 2015 | Retailers Inadequately Secured Against Risks From TemporaryWorkers |
eSecurity Planet | December 8, 2015 | Over a Third of U.S. Retailers Don’t Know Which Systems TheirTemporary Workers Have Accessed |
Market Wired | December 8, 2015 | New Cyber Risk Report Discloses Gaping Holes in Retailers’Information Security |
eWeek | November 29, 2015 | 10 Things to Look for in a Business Email Provider |
Computerworld | November 12, 2015 | Apple wants a little iOS in every enterprise |
PRNewswire | November 12, 2015 | DataMotion Hosts Webinar Featuring Osterman Research onContent Encryption, Key Issues to Consider and Best Practices |
Market Wired | November 11, 2015 | Metalogix Named in Osterman Research Report as an EssentialCloud Management Software Provider to Enhance Office 365 |
IT Business Edge | November 5, 2015 | Why the Unified Communications Ecosystem is So Odd |
eWeek | November 5, 2015 | Businesses Hesitant About Migration to Unified Communications |
ITProPortal | October 31, 2015 | Taking back control of your corporate data |
IT Business Edge | | 4 Issues Companies Should Address Before Adopting a UCPlatform |
Computerworld | October 30, 2015 | Como assumir o controle do compartilhamento de informaçõesna sua empresa |
TNI | October 27, 2015 | Hacia un nuevo CIO |
MIS Asia | October 27, 2015 | Poor disposal of mobile devices creates massive security risk |
BusinessWire | October 20, 2015 | ownCloud Unveils First and Only Flexible Hybrid CloudEnterprise File Sync & Share Solution with on-Premise ControlPlane |
Notícias | October 18, 2015 | 4 dicas para reduzir riscos com ferramentas de sincronização ecompartilhamento |
Banking Exchange | October 14, 2015 | October: A month to measure cyber defenses |
Security Info Watch | October 14, 2015 | FTC Throws Down the Cyber Security Gauntlet |
CSO | October 7, 2015 | Quarter of films can’t tell how hackers get in |
IT World | October 7, 2015 | Quarter of films can’t tell how hackers get in |
Sys-Con Media | October 6, 2015 | Osterman Research and DataMotion Whitepaper and SurveyAddress Content Encryption Best Practices |
IT News Africa | October 6, 2015 | It’s time for CIOs to change strategy in the fight against consumertech |
Biztech Africa | October 6, 2015 | Time for CIOs to change strategy in the fight against consumertechnology |
Computerworld | October 5, 2015 | Gestão de soluções FSS em ambiente empresarial |
MakeUseOf | October 5, 2015 | 5 Devices You Do NOT Want to Connect to the Internet of Things |
CSO | October 2, 2015 | Execs blame security breaches on user behavior, executiveleadership: CyberArk |
InfoSecurity | October 1, 2015 | The Long Goodbye |
IBN | September 30, 2015 | KnowBe4 Phishing Research Shows Men 225% More Prone toGive up the Goods |
DarkReading | September 29, 2015 | Why Many Organizations Still Don’t Use Threat IntelligencePortals |
Cloud Hub | September 22, 2015 | IBM launches Cloud Security Enforcer to lockdown shadow IT |
Partner Marketing | September 17, 2015 | You’ve Got Email (Malware) |
IT World Canada | September 8, 2015 | Companies battle for control with consumer-grade file sharingsystems |
Business Cloud News | September 8, 2015 | Microsoft unveils cloud security plans for Adallom amid risingcloud unrest |
CloudTech | September 7, 2015 | More than three quarters of firms concerned over consumergrade cloud storage |
Windows IT Pro | August 18, 2015 | New report slams Office 365 compliance features unfairly |
Idaho Business Review | August 5, 2015 | The 3 top security issues your firm needs to address |
BusinessWire | August 4, 2015 | Smarsh Offers Enhanced Archiving Support for Microsoft Office365 Environments |
Channelnomics | July 31, 2015 | Compliance, Offie 365 needs call for partner assistance |
Credit Union Times | July 21, 2015 | KnowBe4 Automates Security Training |
ITProPortal | July 13, 2015 | High-profile breaches spark explosive demand for securityawareness training |
ITProPortal | July 12, 2015 | Cloudy with a chance of data loss: Has corporate IT lost control? |
DarkReading | June 30, 2015 | Spikes Security Introduces Isla, Web Malware Isolation System |
The Legal Intelligencer | June 23, 2015 | Cybersecurity Threat-Sharing in the Legal Community |
Above the Law | May 20, 2015 | Phishing and Malware Cyberattacks are Directed at Law Firms(and Clients) – So it’s Time to Train Employees |
FierceMobileIT | May 20, 2015 | Good Technology gives employees mobile email tool to work withOffice documents |
Lexology | May 12, 2015 | Phishing and malware cyberattacks are directed at law firms (andclients) – so it’s time to train employees |
Sys-Con Media | May 7, 2015 | Breach Response Plans Often Overlooked in Higher Education |
Fierce Content Management | April 29, 2015 | Are you archiving your Web content? You should be |
Fox News | April 18, 2015 | Hacking into your home: TVs, refrigerators could be portal to mostsensitive info |
BCW | April 16, 2015 | Zscaler Introduces World’s First Cloud-Based Next GenerationFirewall with Zscaler Winter 2015 |
CSO | March 26, 2015 | Survey: 75% of firms would take hours or longer to spot breach |
Business Solutions | March 26, 2015 | Study Shows Phishing Is Directly Related To 83% Of SecurityConcerns |
Mother Nature Network | March 18, 2015 | Is your smart home safe or has it become an evil botnet? |
PlumChoice | March 17, 2015 | PlumChoice: Cloud Application Success Requires IncreasedSupport for Product Adoption and Ongoing Use |
CIO | March 12, 2015 | Addressing Your Shelfware Problems Can Help You Get GoodCyber Security |
Security Asia | March 2, 2015 | Is your security software sitting unused on the shelf? |
CIO | February 26, 2015 | Is Your Security Software Sitting Unused on the Shelf? |
PR.com | February 26, 2015 | Osterman Research Finds a Lack of Good Information GovernanceIncreases Corporate Costs and Risk |
Virtual-Strategy Magazine | February 25, 2015 | South River Technologies and Osterman Research: Enterprise IT IsLosing Control Over Business Data |
MarketWired | February 25, 2015 | South River Technologies and Osterman Research: Enterprise IT IsLosing Control Over Business Data |
Virtual-Strategy Magazine | February 24, 2015 | Osterman Research Finds Most Organizations at Significant Riskfrom Use of Consumer File Sync and Share Tools |
ElectroPages | February 19, 2015 | The BYOD ethos is a corporate cyber attack waiting to happen |
ChinaByte.com | February 6, 2015 | 你的企业有多少安全软件只是“摆设”? |
Reseaux Telecoms | January 29, 2015 | 28% des logiciels de sécurité achetés par les entreprises ne sontpas utilisés |
Open Systems Publications | January 29, 2015 | Osterman: до 60% купленных для защиты компьютеровпрограмм остаются неиспользованными |
CSO | January 27, 2015 | Twenty-eight percent of security spending wasted on shelfware |
Newsfactor | January 23, 2015 | New Zero-Day Flaws Found in Adobe Flash |
TechTarget Search Security | January 21, 2015 | Wasted spending on security shelfware affects small businessesmore |
Politico Morning Cybersecurity | January 21, 2015 | Report Watch |
Boan News | January 21, 2015 | 각종 보안예산, 밑 빠진 독에 물 붓기 상태 |
Security Week | January 20, 2015 | Security Spending Wasted When Software Goes Unimplemented |
Dark Reading | January 16, 2015 | A Lot of Security Purchases Remain Shelfware |
Corporate Counsel | January 16, 2015 | If It Stays on the Shelf, Security Software Won’t Help |
PaymentsSource | January 16, 2015 | Many Security Software Investments Are Wasted: Trustwave |
MSPmentor | January 16, 2015 | Trustwave: Smaller Organizations Spend More on IT SecurityThan Others |
Business News Daily | January 16, 2015 | Is Your Small Business Wasting Money on Security? |
Talkin’ Cloud | January 15, 2015 | Are Some Organizations Leaving IT Security Software “On theShelf”? |
eWeek | January 14, 2015 | Security Shelfware Continues to Be a Big Challenge |
Entrepreneur | January 7, 2015 | The Top 5 Cloud IT Challenges Facing Businesses in 2015 |