Skip to content
  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on November 25, 2022January 10, 2023

The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-based Channels – White Paper

Presents new findings that explore the changing threat landscape for email, web, and cloud apps, and what organizations must do to bolster security protections for these channels. Commissioned by Perception Point.

Posted on October 21, 2022October 21, 2022

The Business Cost of Phishing – White Paper

Quantifies the direct costs borne by organizations in mitigating the phishing threat, and explores expectations about how phishing will change over the next 12 months. Commissioned by IRONSCALES.

Posted on October 14, 2022October 14, 2022

Ransomware Attacks: Strategies for Prevention and Recovery – White Paper

Discusses eight areas where many organizations remain susceptible to ransomware attacks, outlines new and emerging solutions or approaches that can be used to bolster controls and protections, and offers a report card for self-assessment by organizations. Sponsored by Asigra, BlackFog, Cyren, Infoblox, IRONSCALES, Micro Focus, SonicWall, and Trend Micro.

Posted on September 22, 2022September 22, 2022

Application Security in a Multi-Cloud World 2022 – White Paper

The security challenges and weaknesses facing organizations hosting applications across multiple cloud providers. Commissioned by Radware.

Posted on August 19, 2022August 19, 2022

Does a Microsoft Only Approach to Information Governance Make Sense? – Webinar

Discussion between Micro Focus and Osterman Research on best practices for information governance. Webinar hosted by Micro Focus on August 25, 2022.

Posted on August 17, 2022August 19, 2022

State of Cloud Security Maturity 2022 – Webinar

Presentation by Osterman Research and Ermetic of the key findings from the state of cloud security maturity research project. Hosted by Ermetic on August 17, 2022.

Posted on August 17, 2022August 17, 2022

Improve Machine Learning Model Training with Collaborative Secure Learning – White Paper

Investigation into the value of collaborative secure learning for training machine learning models, including examples from cybersecurity, financial services, and healthcare. Commissioned by Duality Technologies.

Posted on August 5, 2022August 19, 2022

State of Cloud Security Maturity 2022 – White Paper

Research to assess cloud security maturity to build a baseline against the Ermetic Cloud Security Maturity Model. Commissioned by Ermetic.

Posted on July 15, 2022September 22, 2022

The State of Mobile App Security 2022 – White Paper

Mobile apps have become key tools for businesses to serve customers, earn revenue, and enable remote work by employees. Findings of a survey into the state of mobile app security in 2022. Commissioned by Approov.

Posted on July 13, 2022August 5, 2022

Email Security Solutions to Reduce Human Activated Risk – Buyers Guide

Buyers Guide that examines the challenge of human activated risk, and what organizations can do to address the three types of human activated risk through new email security solutions. Commissioned by Egress.

Posts navigation

Older posts

Published Research

Our insight is delivered through survey reports, white papers, webinars and more on cybersecurity, data protection and information governance. What We Do.

Resources by Type

White Papers

Survey Reports

Webinars

Podcast Episodes

Infographics

Interviews

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2023 Osterman Research

 

Loading Comments...