Osterman Research is frequently quoted in the press. Here’s our collection of press mentions from 2021.

PUBLICATIONDATEARTICLE
December 2021
MarketScreener20Mimecast : State CIOs Rank Security as No. 1 Priority for 9th Year
BioMetric Update16Ping launches authorization, BIO-key updates panel for enterprise IAM
VentureBeat16Ory lands $22.5M for zero trust security powered by open source
GlobeNewswire15BIO-key Launches Enhanced Admin Panel and User Experience for IT Teams Managing its PortalGuard Identity-as-a-Service (IDaaS) Solution
GlobeNewswire13Osterman Research Surveys Show IT & Security Decision-Makers Plan Investments in Multi-Factor Authentication & Zero Trust Solutions to Counter Rising Cyberthreats
Forbes13Achieving Cyber Workforce Optimization In 2022
Solutions Review632 Experts Share Predictions for Information Security in 2022
SCMedia6The data exfiltration deluge: we’ve lost the battle, but can win the war
Security Boulevard2Ransomware pivot 2021: attackers now grab, threaten to leak sensitive data
November 2021
VentureBeat26Report: Zero-trust architecture is expected to increase cybersecurity efficacy by 144%
Data Center Knowledge23Trust no one: New technology platforms expand the attack surface
Security Boulevard22Shadow Code is a Major Risk for Web Applications
Cision17Research: Zero Trust is Expected to Double the Efficacy of Cybersecurity Protections
SearchSecurity156 reasons unpatched software persists in the enterprise
RMail11RMail Humanizes E-Security in RPost’s Year-End Update
Security Boulevard9Why you need to rethink your data security strategy and go beyond DLP
Market Screener4Government Cybersecurity: Forces Align to Fix K-12 Schools’ Cybersecurity Problem
Reseller News2Enterprises with subsidiaries more prone to cyber attacks, study says
CSO1Enterprises with subsidiaries more prone to cyberattacks, study says
October 2021
Security Boulevard25Introducing Anti Data Exfiltration (ADX)
BlackFog25Anti Data Exfiltration (ADX) remains a top priority for 94% of organizations
KMWorld21Managing your most human data source: Microsoft Teams
JaxEnter13How To Prepare Your Business For Data Security Risks In The Next Decade?
HelpNet Security13Is the government’s response to cybersecurity threats enough for your organization?
PR Newswire12Unbound Core Virtualizes Enterprise Cryptographic Orchestration
Dice11How Third-Party Code Makes App Development A Cybersecurity Risk
MarketScreener6Cybersecurity Awareness Training Results in Greater Employee Engagement
Search Security16 reasons unpatched software persists in the enterprise
September 2021
The Enterprisers Project29Why DevSecOps fails: 4 signs of trouble
Health IT Security274 Ways Organizations Can Prevent Healthcare Phishing Attacks
Formtek27Security: Reshuffling of Workers during “Great Resignation” Exacerbates Data Leaks
SCMedia23The parent company trap: Subsidiaries hide sources of cyber risk
MSSP Alert23Enterprises with Multiple Subsidiaries Face Greater Risk of Cyber Attacks
Yahoo! Finance23New CyCognito Report Reveals Subsidiaries are Global Enterprise Achilles Heel; Increasing Attack Surface and Exposure Drawing in Attackers
BollyInside22PerimeterX Third Annual Analysis Report Reveals False Sense of Security
Security Magazine22Shadow Code remains a high security risk
BusinessWire21False Sense of Security — Third Annual PerimeterX Report Reveals that Shadow Code Remains a High Risk
PRWeb21ActiveNav Launches Data Mapping as a Service to Help Privacy and Compliance Teams Shine a Light on Sensitive Data Hotspots
Security Boulevard20A Look Inside the Shadow Code Risk
BusinessWire16GrammaTech Selected SINET16 Award Winner
Market Screener15Mimecast : Ransomware Drives Demand for Managed Security Services
Security Intelligence10How Companies Can Prepare for Botnet Attacks on APIs
August 2021
Aerospace Manufacturing and Design30Open-source software vulnerabilities
Beta News20Ensuring compliance takes a front seat when using collaboration tools
Gulf News17It is time businesses looked closely at emails as their weakest link
Security Intelligence165 Ways to Defend Against Supply Chain Cyberattacks
MeriTalk9Study Finds Vulnerabilities in COTS Open-Source Components
Nextgov5Report Draws Attention to Vulnerabilities in Commercial-Off-the-Shelf Products
TechNewsWorld4Study Finds 100% of Commercial Apps Contain Security Flaws
LinuxInsider4Study Finds 100% of Commercial Apps Contain Security Flaws
BusinessWire4Osterman Research Software Supply Chain Study Finds 100 Percent of Commercial Applications Contain Vulnerable Software Components
Security Boulevard3Website Risk Analyzer Finds Threats in Your Third Party Code
July 2021
JD Supra29Does Teams Work Make the Dreams Work? Or Does it Create Information Governance and Compliance Nightmares?
Security Boulevard29Elevating Web App Security to a National Priority
HelpNet Security19Half of organizations are ineffective at countering phishing and ransomware threats
Marketing Dive15Google begins supporting email authentication protocol to guard against phishing
IDM15Compliance for Microsoft Teams – Reclaim the Driver’s Seat
Taiwan News1384% of Organizations Experienced Phishing & Ransomware Type Threats in the Past 12 Months
ITPro1384% of Organizations Experienced Phishing or Ransomware Attacks in the Last Year
ITProToday8Building an Effective Cybersecurity Culture
June 2021
The Register25‘What are the odds someone will find and exploit this?’ Nice one — you just released an insecure app
GlobeNewswire23PerimeterX Code Defender Named Best Security Solution by the 2021 SIIA CODiE Awards
HelpNet Security3It’s time to stop ransomware in its tracks
May 2021
CSO Online25Tailor security training to developers to tackle software supply chain risks
IDM21Study Identifies Microsoft Teams Data as Compliance Concern
GlobeNewswire20Study Identifies Microsoft Teams Data as a Source of Compliance Concern Among IT Leaders
E&T20Was Your Disaster Recovery Plan Ready for a Pandemic?
HelpNet Security19Endpoint security: How to shore up practices for a safer remote enterprise
The Daily Swig14Shift Right: Developers Knowingly Release Insecure Applications, Says Report
Security Boulevard14What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware
Security Boulevard1381% of Developers at Large Organizations Admit to Knowingly Releasing Vulnerable Applications
SC Magazine13Developers knowingly push flawed code, doubt build environments are secure
April 2021
Virtualization Review16Misconfigurations Continue to Plague Cloud Security, New Reports Say
Digital Journal15Why Security Awareness Training is a Top Cybersecurity Investment for Business
Security Boulevard13Osterman Research: Almost One-Third of US Companies Under-Resourcing Cloud Security Despite Escalating Risks
SC Media1Offboarding Tips Will Prevent Employee Data Theft When People Leave the Company
March 2021
Security Boulevard30You Want to Know How to Stop Phishing for Good. Hint: It’s Not a Silver Bullet
Harvard Business Review9Cyberattacks Are Inevitable. Is Your Company Prepared?
February 2021
Business 2 Community17What You Need to Know About Remote Employee Monitoring Software
HelpNet Security13Employees Aware of Privacy Risks, But Unsure of How They Affect the Workplace
January 2021
Security Boulevard28App Security Takes a Back Seat in the Drive to Digital Transformation
Professional Security Magazine Online25Web Application Security Report
Business 2 Community22Employee Offboarding: How to Keep Data Safe During a Termination
HelpNet Security22Organizations Struggle to Maintain Application Security Across Platforms
PR Wire21Radware research shows API abuse is a leading threat – and enterprises are unprepared for bot traffic
ContinuityCentral.com21Will APIs be the gateway to effective cyber attacks in 2021?
ITProPortal21Most Security Staff Have Little Say In App Security
SC Media20Reliance on cloud, APIs create confusion and introduce risk into software development
Security Magazine20API Abuse is a Leading Cyber Threat
Security Boulevard12Digital Transformation and the Shadow Code Risk