Organizations need to re-examine their approach to BEC protection
BEC attacks are growing year over year and are projected to be twice as high as the threat of phishing in general, according to IRONSCALES and Osterman Research. 93% of …
BEC attacks are growing year over year and are projected to be twice as high as the threat of phishing in general, according to IRONSCALES and Osterman Research. 93% of …
Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of …
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …
The managed cybersecurity services market is undergoing a significant shift, according to a new survey conducted by Osterman Research. As organizations struggle with too many …
An Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data …
Unbound Security unveiled the latest evolution of Unbound CORE for virtualized cryptography and encryption key management. CORE virtualizes key management and enables a single …
Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more …
Half of US organizations are not effective at countering phishing and ransomware threats, Osterman Research research reveals. The findings come from a study compiled from …
While spending on cloud services is high, with more than half of respondents having spent more than $10 million and 11% having spent more than $100 million in the last three …
Global organizations are struggling to maintain consistent application security across multiple platforms, and they are also losing visibility with the emergence of new …
Today, a stark disconnect exists between the inadequacy of crisis exercising and the desire to build an effective cyber crisis response function, according to an Osterman …