Osterman Research is frequently quoted in the press. Here’s our collection of press mentions this year.

PUBLICATIONDATEARTICLE
December
iTwire22What MSPs need to know about work migrations
Security Boulevard13Phishing Growing in Numbers, Sophistication and Cost
November
Help Net Security28How the dynamics of phishing attacks are changing
SC Media28Cyberattack cost examined
VentureBeat26Top 5 stories of the week: Deloitte’s cybersecurity predictions, the true cost of a breach, AI’s new diet
PR Newswire22Enterprises Spend $1,197 per Employee Annually to Address Increasingly Sophisticated and Successful Perception Point
Trend Micro17Email Security Best Practices for Phishing Prevention
eWeek16Understanding the Business Costs of Phishing Attacks
SCMedia10What it takes to get developers engaged with security
Security Magazine74 recommendations to combat phishing
October
Security Boulevard27IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals
SpiceWorks26Unlock an API-first Security Strategy To Tackle Popular Attack Vectors
Security Boulevard25FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing
ITProToday25Companies Lack Capabilities to Secure Cloud Infrastructure: Report
BusinessWire21Cerby Chief Trust Officer Matthew Chiodi To Join ISACA Digital Trust Advisory Board
CSO20Securing your organization against phishing can cost up to $85 per email
Dark Reading19Phishing Mitigation Can Cost Businesses More Than $1M Annually
Cybersecurity Dive18New Study Finds Phishing Represents a Huge Time and Expense Burden for Organizations
ITPro Today17Companies Lack Capabilities to Secure Cloud Infrastructure: Report
MarTech Series13ActiveNav Unveils Market’s First Tool to Identify Unstructured, Risky Data in Microsoft Teams Channel Conversations
September
GlobeNewswire21New Radware Report: Organizations Admit They are Unprepared to Achieve Application Protection Across Multi-Cloud Environments
Security Boulevard21The Multi-Cloud is The New Normal, But Creates Key Security Challenges
InformationWeek9Twilio Breach: 5 Questions to Ask About Protecting Your Own Business
Visual Capitalist9Ranked: The Top Cyberattacks Against Businesses
Digital Information World8Common Email Security Practices Called into Question as 89% of Organizations Suffered Breaches in the Past Year
Security Boulevard796% Could Have Prevented Their Identity Breach – IDSA
HBW Insight6Weak Cybersecurity In Mobile Health Apps Puts Users’ Medical Records At Risk, Reports Find
August
Martech Series26Email Unsafe for Transferring Sensitive Files: How COVID Made it Worse
TechBeacon19Organizations Unprepared for CPRA, Survey Finds
Security Boulevard17The State of Mobile App Security in 2022 in Healthcare
Security Boulevard17The State of Mobile App Security in 2022 in Financial Services
AccessWire15Cyren Announces Second Quarter 2022 Financial Results
VentureBeat15Black Hat 2022: Why machine identities are the most vulnerable
Fast Company8Phishing: The contagion killing businesses and what you can do to prevent attacks
Security Boulevard5How SBOMs Reduce Software Procurement Risk and Improve Enterprise Security
BetaNews484 percent of companies have only basic cloud security capability
BusinessWire4Osterman Research Survey Finds 84% of Companies Have Only Rudimentary Capabilities for Securing Their Cloud Infrastructure
HelpNet Security4Businesses lack visibility into run-time threats against mobile apps and APIs
Newswires1Guardian Digital Cloud Email Security Addresses Critical Shortcomings in Email Protection, Reduces Management Complexity
July
IDM29Is Microsoft for Information Governance Enough?
Security Boulevard26How to Select the Right MDR Service
Security Boulevard26Tackling Data Sprawl in the Cloud
BusinessWire14Approov and Osterman Research Issue “The State of Mobile App Security in 2022”
Business Chief9Are your employees using apps in the shadow IT universe?
Security Magazine6Cybersecurity teams and employees disagree on shadow IT use
Security Boulevard6Why the Rush to MDR?
Security Brief1New study reveals 51% of employees using unauthorised apps
June
Security Boulevard28Should You Outsource or Manage Security In-House?
BusinessWire27Cerby Launches With World’s First Security Platform for Unmanageable Applications
CSO Online27Security startup Cerby debuts with platform to manage shadow IT
DarkReading2480% of Legacy MSSP Users Planning MDR Upgrade
MSSP Alert22Security Alert Overload Propels Big Outsourcing Shift to MDR Services
IT World Canada22Become a successful security organization built for tomorrow
BusinessWire21New Research Report Highlights Significant Shift to Managed Detection and Response (MDR) Services
SC Media6Build security awareness into the company’s culture
May
BusinessWire19Approov Runtime Secrets Protection Shields Mobile App Secrets, Prevents Theft of API Keys and Credentials, Blocks Mobile App DDoS Attacks
ERP Solutions Review18How SBOMs Reduce Software Procurement Risk and Improve Enterprise Security
Security Boulevard18Strata Identity Proposes Standard to Simplify Identity Management
StreetInsider16Cyren Announces First Quarter 2022 Financial Results
BetaNews12Enterprises struggle to discover cloud access policies
BusinessWire12Strata Identity Report Finds Most Enterprises Will Use Three or More Clouds in 12 Months, but Only 25% Can Discover Access Policies
See also Yahoo! and AP News
BetaNews6Microsoft 365 targeted as businesses struggle to block email threats
Teiss4Why do British companies face a greater risk of email breaches?
CyberNews1Michael Sampson, Osterman Research: “a significant proportion of organizations are not sufficiently proactive”
April
VentureBeat22Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacks
FinTech Futures21Osterman Research report: privacy compliance in the US, status and progress in 2022
ThreatPost20Most Email Security Approaches Fail to Block Common Threats
Accesswire20New Global Research Reveals that 90 Percent of Organizations Have Suffered One or More Successful Email Breaches in the Last 12 Months
GlobeNewswire19PerimeterX Code Defender Extends Capability To Stop Supply Chain Attacks
March
Embedded11Top three tips for ensuring software supply chain security
FastCompany7Why training is essential to building a strong cybersecurity culture
January
MarketScreener20Biden Aims to Drive Zero-Trust Architecture Nationwide
HelpNet Security20GrammaTech CodeSentry 3.0 improves software supply chain security
HelpNet Security20TAC Security ESOF VMDR offers vulnerability management coverage in a single platform
Yahoo! Finance19GrammaTech CodeSentry Enhances Software Bill of Materials Capabilities to Improve Software Supply Chain Security
Security Boulevard17Anti Data Exfiltration versus Endpoint Security
Data Center Knowledge11Log4Shell Vulnerability Highlights Software Supply Chain Issues