Osterman Research
Image-based phishing tactics evolve
While 70% of organizations feel their current security stacks are effective against image-based and QR code phishing attacks, 76% were still compromised in the last 12 months, …
Balancing AI’s promise with privacy and intellectual property concerns
Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. One of the key …
Companies need to rethink how they implement identity security
More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, …
Cybercriminals turn to AI to bypass modern email security measures
Cybercriminals employ artificial intelligence (AI) to create complex email threats like phishing and business email compromise (BEC) attacks, while modern email security …
Organizations invest in AI tools to elevate email security
To counteract new and emerging threat methods enhanced by artificial intelligence, specialized email security vendors are leveraging a synergy of AI and human insights to …
Organizations need to re-examine their approach to BEC protection
BEC attacks are growing year over year and are projected to be twice as high as the threat of phishing in general, according to IRONSCALES and Osterman Research. 93% of …
Threat actors extend attack techniques to new enterprise apps and services
Perception Point announced the publication of a report, “The Rise of Cyber Threats Against Email, Browsers and Emerging Cloud-Based Channels“, which evaluates the responses of …
Businesses lack visibility into run-time threats against mobile apps and APIs
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …
Visibility into runtime threats against mobile apps and APIs still lacking
A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance …
Security pros increasingly plan to adopt MDR services in the next 12 months
The managed cybersecurity services market is undergoing a significant shift, according to a new survey conducted by Osterman Research. As organizations struggle with too many …
Despite large investments in security tools, organizations are not confident they can stop data exfiltration
An Osterman Research survey of 255 cybersecurity professionals (CIOs, IT managers, CISOs and security managers), exploring attitudes and perceptions surrounding data …
Unbound CORE virtualizes key management via single pane of glass cryptographic platform
Unbound Security unveiled the latest evolution of Unbound CORE for virtualized cryptography and encryption key management. CORE virtualizes key management and enables a single …
Featured news
Sponsored
Don't miss
- The relationship between cybersecurity and work tech innovation
- eBook: Cloud security skills
- Russian hackers’ custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
- CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)
- The rising influence of AI on the 2024 US election