searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Osterman Research

Get our top stories in your inbox

Companies need to rethink how they implement identity security

September 12, 2023

More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, …

Cybercriminals turn to AI to bypass modern email security measures

August 23, 2023

Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security …

Organizations invest in AI tools to elevate email security

August 21, 2023

To counteract new and emerging threat methods enhanced by artificial intelligence, specialized email security vendors are leveraging a synergy of AI and human insights to …

Organizations need to re-examine their approach to BEC protection

March 14, 2023

BEC attacks are growing year over year and are projected to be twice as high as the threat of phishing in general, according to IRONSCALES and Osterman Research. 93% of …

Threat actors extend attack techniques to new enterprise apps and services

November 23, 2022

Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of …

Businesses lack visibility into run-time threats against mobile apps and APIs

August 4, 2022

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

Visibility into runtime threats against mobile apps and APIs still lacking

July 22, 2022

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …

Security pros increasingly plan to adopt MDR services in the next 12 months

June 23, 2022

The managed cybersecurity services market is undergoing a significant shift, according to a new survey conducted by Osterman Research. As organizations struggle with too many …

Despite large investments in security tools, organizations are not confident they can stop data exfiltration

October 29, 2021

An Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data …

Unbound CORE virtualizes key management via single pane of glass cryptographic platform

October 13, 2021

Unbound Security unveiled the latest evolution of Unbound CORE for virtualized cryptography and encryption key management. CORE virtualizes key management and enables a single …

Assessing subsidiary risk a top priority for most enterprises, yet they still lack proper visibility

September 28, 2021

Most enterprises are overconfident and lack the proper visibility to manage subsidiary risk, according to an Osterman Research study. The study surveyed enterprises with more …

Half of organizations are ineffective at countering phishing and ransomware threats

July 19, 2021

Half of US organizations are not effective at countering phishing and ransomware threats, Osterman Research research reveals. The findings come from a study compiled from …

Posts navigation

1 2 3

Featured news

  • 9 essential ransomware guides and checklists available for free
  • Securing GitHub Actions for a safer DevOps pipeline
  • Protecting against FraudGPT, ChatGPT’s evil twin
Guide: SaaS Offboarding Checklist

Sponsored

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Free entry-level cybersecurity training and certification exam

Guide: Attack Surface Management (ASM)

Don't miss

9 essential ransomware guides and checklists available for free

Securing GitHub Actions for a safer DevOps pipeline

Protecting against FraudGPT, ChatGPT’s evil twin

Malicious ads creep into Bing Chat responses

How should organizations navigate the risks and opportunities of AI?

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us