PUBLICATION | DATE | ARTICLE |
December | | |
iTwire | 22 | What MSPs need to know about work migrations |
Security Boulevard | 13 | Phishing Growing in Numbers, Sophistication and Cost |
November | | |
Help Net Security | 28 | How the dynamics of phishing attacks are changing |
SC Media | 28 | Cyberattack cost examined |
VentureBeat | 26 | Top 5 stories of the week: Deloitte’s cybersecurity predictions, the true cost of a breach, AI’s new diet |
PR Newswire | 22 | Enterprises Spend $1,197 per Employee Annually to Address Increasingly Sophisticated and Successful Perception Point |
Trend Micro | 17 | Email Security Best Practices for Phishing Prevention |
eWeek | 16 | Understanding the Business Costs of Phishing Attacks |
SCMedia | 10 | What it takes to get developers engaged with security |
Security Magazine | 7 | 4 recommendations to combat phishing |
October | | |
Security Boulevard | 27 | IBM Cost of a Data Breach 2022 – Highlights for Cloud Security Professionals |
SpiceWorks | 26 | Unlock an API-first Security Strategy To Tackle Popular Attack Vectors |
Security Boulevard | 25 | FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing |
ITProToday | 25 | Companies Lack Capabilities to Secure Cloud Infrastructure: Report |
BusinessWire | 21 | Cerby Chief Trust Officer Matthew Chiodi To Join ISACA Digital Trust Advisory Board |
CSO | 20 | Securing your organization against phishing can cost up to $85 per email |
Dark Reading | 19 | Phishing Mitigation Can Cost Businesses More Than $1M Annually |
Cybersecurity Dive | 18 | New Study Finds Phishing Represents a Huge Time and Expense Burden for Organizations |
ITPro Today | 17 | Companies Lack Capabilities to Secure Cloud Infrastructure: Report |
MarTech Series | 13 | ActiveNav Unveils Market’s First Tool to Identify Unstructured, Risky Data in Microsoft Teams Channel Conversations |
September | | |
GlobeNewswire | 21 | New Radware Report: Organizations Admit They are Unprepared to Achieve Application Protection Across Multi-Cloud Environments |
Security Boulevard | 21 | The Multi-Cloud is The New Normal, But Creates Key Security Challenges |
InformationWeek | 9 | Twilio Breach: 5 Questions to Ask About Protecting Your Own Business |
Visual Capitalist | 9 | Ranked: The Top Cyberattacks Against Businesses |
Digital Information World | 8 | Common Email Security Practices Called into Question as 89% of Organizations Suffered Breaches in the Past Year |
Security Boulevard | 7 | 96% Could Have Prevented Their Identity Breach – IDSA |
HBW Insight | 6 | Weak Cybersecurity In Mobile Health Apps Puts Users’ Medical Records At Risk, Reports Find |
August | | |
Martech Series | 26 | Email Unsafe for Transferring Sensitive Files: How COVID Made it Worse |
TechBeacon | 19 | Organizations Unprepared for CPRA, Survey Finds |
Security Boulevard | 17 | The State of Mobile App Security in 2022 in Healthcare |
Security Boulevard | 17 | The State of Mobile App Security in 2022 in Financial Services |
AccessWire | 15 | Cyren Announces Second Quarter 2022 Financial Results |
VentureBeat | 15 | Black Hat 2022: Why machine identities are the most vulnerable |
Fast Company | 8 | Phishing: The contagion killing businesses and what you can do to prevent attacks |
Security Boulevard | 5 | How SBOMs Reduce Software Procurement Risk and Improve Enterprise Security |
BetaNews | 4 | 84 percent of companies have only basic cloud security capability |
BusinessWire | 4 | Osterman Research Survey Finds 84% of Companies Have Only Rudimentary Capabilities for Securing Their Cloud Infrastructure |
HelpNet Security | 4 | Businesses lack visibility into run-time threats against mobile apps and APIs |
Newswires | 1 | Guardian Digital Cloud Email Security Addresses Critical Shortcomings in Email Protection, Reduces Management Complexity |
July | | |
IDM | 29 | Is Microsoft for Information Governance Enough? |
Security Boulevard | 26 | How to Select the Right MDR Service |
Security Boulevard | 26 | Tackling Data Sprawl in the Cloud |
BusinessWire | 14 | Approov and Osterman Research Issue “The State of Mobile App Security in 2022” |
Business Chief | 9 | Are your employees using apps in the shadow IT universe? |
Security Magazine | 6 | Cybersecurity teams and employees disagree on shadow IT use |
Security Boulevard | 6 | Why the Rush to MDR? |
Security Brief | 1 | New study reveals 51% of employees using unauthorised apps |
June | | |
Security Boulevard | 28 | Should You Outsource or Manage Security In-House? |
BusinessWire | 27 | Cerby Launches With World’s First Security Platform for Unmanageable Applications |
CSO Online | 27 | Security startup Cerby debuts with platform to manage shadow IT |
DarkReading | 24 | 80% of Legacy MSSP Users Planning MDR Upgrade |
MSSP Alert | 22 | Security Alert Overload Propels Big Outsourcing Shift to MDR Services |
IT World Canada | 22 | Become a successful security organization built for tomorrow |
BusinessWire | 21 | New Research Report Highlights Significant Shift to Managed Detection and Response (MDR) Services |
SC Media | 6 | Build security awareness into the company’s culture |
May | | |
BusinessWire | 19 | Approov Runtime Secrets Protection Shields Mobile App Secrets, Prevents Theft of API Keys and Credentials, Blocks Mobile App DDoS Attacks |
ERP Solutions Review | 18 | How SBOMs Reduce Software Procurement Risk and Improve Enterprise Security |
Security Boulevard | 18 | Strata Identity Proposes Standard to Simplify Identity Management |
StreetInsider | 16 | Cyren Announces First Quarter 2022 Financial Results |
BetaNews | 12 | Enterprises struggle to discover cloud access policies |
BusinessWire | 12 | Strata Identity Report Finds Most Enterprises Will Use Three or More Clouds in 12 Months, but Only 25% Can Discover Access Policies See also Yahoo! and AP News |
BetaNews | 6 | Microsoft 365 targeted as businesses struggle to block email threats |
Teiss | 4 | Why do British companies face a greater risk of email breaches? |
CyberNews | 1 | Michael Sampson, Osterman Research: “a significant proportion of organizations are not sufficiently proactive” |
April | | |
VentureBeat | 22 | Report: Orgs spend 3,850 hours annually cleaning up email-based cyberattacks |
FinTech Futures | 21 | Osterman Research report: privacy compliance in the US, status and progress in 2022 |
ThreatPost | 20 | Most Email Security Approaches Fail to Block Common Threats |
Accesswire | 20 | New Global Research Reveals that 90 Percent of Organizations Have Suffered One or More Successful Email Breaches in the Last 12 Months |
GlobeNewswire | 19 | PerimeterX Code Defender Extends Capability To Stop Supply Chain Attacks |
March | | |
Embedded | 11 | Top three tips for ensuring software supply chain security |
FastCompany | 7 | Why training is essential to building a strong cybersecurity culture |
January | | |
MarketScreener | 20 | Biden Aims to Drive Zero-Trust Architecture Nationwide |
HelpNet Security | 20 | GrammaTech CodeSentry 3.0 improves software supply chain security |
HelpNet Security | 20 | TAC Security ESOF VMDR offers vulnerability management coverage in a single platform |
Yahoo! Finance | 19 | GrammaTech CodeSentry Enhances Software Bill of Materials Capabilities to Improve Software Supply Chain Security |
Security Boulevard | 17 | Anti Data Exfiltration versus Endpoint Security |
Data Center Knowledge | 11 | Log4Shell Vulnerability Highlights Software Supply Chain Issues |