Skip to content
  • Home
  • What we do
  • Research reports
  • Clients
  • Press
  • Newsletter
  • Contact

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What we do
  • Research reports
  • Clients
  • Press
  • Newsletter
  • Contact
Posted on November 28, 2023November 29, 2023

How are bots changing buyer behavior? – commissioned by Netacea

How are bots changing buyer behavior? – commissioned by Netacea

How scalper bots are changing buyer habits, such as paying inflated prices to scalpers on secondary markets or turning to using bots themselves. Commissioned by Netacea.

Posted on September 7, 2023November 17, 2023

The State of the Identity Attack Surface: Insights into Critical Protection Gaps – commissioned by Silverfort

The State of the Identity Attack Surface: Insights into Critical Protection Gaps – commissioned by Silverfort

Research into how organizations are protecting against identity threats, with an emphasis on the efficacy of real-time protections to prevent malicious access with compromised credentials. The survey found that far too few organizations have strong protections against identity attacks. Commissioned by Silverfort.

Posted on August 21, 2023November 17, 2023

The Role of AI in Email Security – multi-sponsor white paper

The Role of AI in Email Security – multi-sponsor white paper

Explores the changing threat landscape around email as cybercriminals leverage AI to enhance attacks – and how vendors and organizations are responding to safeguard and improve email security. Sponsored by Abnormal Security, IRONSCALES, KnowBe4, Mimecast, Perception Point, SlashNext, and SonicWall.

Posted on May 18, 2023November 3, 2023

Cyber Workforce Resilience Trend Report – commissioned by Immersive Labs

Cyber Workforce Resilience Trend Report – commissioned by Immersive Labs

Organizations must urgently embrace a new approach to building cyber resilience, including implementing more effective ways to develop and prove cyber capabilities across teams, measure improvement, and cultivate a workforce with the expertise to handle the real-world impact of a cyber incident.

Posted on March 16, 2023November 3, 2023

Defending the Enterprise: The Latest Trends and Tactics in BEC Attacks – commissioned by IRONSCALES

Defending the Enterprise: The Latest Trends and Tactics in BEC Attacks – commissioned by IRONSCALES

Business Email Compromise (BEC) scams are expected to explode in volume and profitability as attacks bypass traditional safeguards. Research on trends and tactics in BEC attacks, including variants, target victims, and precursor channels. Published March 2023.

Posted on February 9, 2023November 3, 2023

Navigating the SaaS Landscape: A Survey of Security Leaders on Security Strategies – commissioned by Obsidian Security

Navigating the SaaS Landscape: A Survey of Security Leaders on Security Strategies – commissioned by Obsidian Security

Learn about the tools, processes, and frameworks security leaders have implemented to address vulnerabilities in SaaS applications. Commissioned by Obsidian Security.

Posted on November 25, 2022November 3, 2023

The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-based Channels – commissioned by Perception Point

The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-based Channels – commissioned by Perception Point

Presents new findings that explore the changing threat landscape for email, web, and cloud apps, and what organizations must do to bolster security protections for these channels. Commissioned by Perception Point.

Posted on October 21, 2022November 3, 2023

The Business Cost of Phishing – commissioned by IRONSCALES

The Business Cost of Phishing – commissioned by IRONSCALES

Quantifies the direct costs borne by organizations in mitigating the phishing threat, and explores expectations about how phishing will change over the next 12 months. Commissioned by IRONSCALES.

Posted on October 14, 2022November 6, 2023

Ransomware Attacks: Strategies for Prevention and Recovery – multi-sponsor white paper

Ransomware Attacks: Strategies for Prevention and Recovery – multi-sponsor white paper

Discusses eight areas where many organizations remain susceptible to ransomware attacks, outlines new and emerging solutions or approaches that can be used to bolster controls and protections, and offers a report card for self-assessment by organizations. Sponsored by Asigra, BlackFog, Cyren, Infoblox, IRONSCALES, Micro Focus, SonicWall, and Trend Micro.

Posted on August 17, 2022November 3, 2023

Improve Machine Learning Model Training with Collaborative Secure Learning – commissioned by Duality Technologies

Improve Machine Learning Model Training with Collaborative Secure Learning – commissioned by Duality Technologies

Investigation into the value of collaborative secure learning for training machine learning models, including examples from cybersecurity, financial services, and healthcare. Commissioned by Duality Technologies.

Posts navigation

Older posts

Exploring emerging topics

Deep dive research into current and emerging topics and trends across cybersecurity, data protection, and information governance. What We Do.

Research by group

Tracking market development

Exploring emerging topics

Quantifying business value

Research by topic

  • Application Security
  • Archiving
  • Artificial Intelligence
  • Authentication
  • Bot Management
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust

Research services for technology vendors

We deliver research-led insights across the domains of cybersecurity, data protection, and information governance for market development and education. More

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

About the Osterman Research survey panel

We survey IT professionals and non-technical end-users in small, mid-sized and large organizations around the world for our research programs. Learn more

Subscribe to our newsletter and follow us on X

Subscribe to our newsletter

Follow @OstermanRsch on X

Read our Notes and Learning blog

RSS Osterman Research – notes and learnings

  • Recent news – November 17
  • Some thoughts on SlashNext’s 2023 report on phishing
  • SANS report from 2021 on cybersecurity in OT/ICS
  • Abnormal’s report on the threats of generative AI
  • Nastiest malware 2023

Copyright © 2023 Osterman Research

 

Loading Comments...