IN THE PRESS

PUBLICATION DATE ARTICLE
Security Brief Australia August 29, 2018

APAC ahead of US and EMEA in AI security adoption - Osterman

HealthIT Security August 28, 2018

Phishing Attacks That Impersonate Trusted Individuals on the Rise

Colorado Springs Business

Journal

August 23, 2018

Mid-sized businesses suffer greatest cybercrime losses

Security Boulevard

August 20, 2018

The enemy is us: a look at insider threats

IT Sec City August 20, 2018

Sicherheitsbudgets mit deutlicher Steigerung

Channelnomics August 16, 2018

Cyber security bill aimed at SMEs will benefit channel and customers

Networks Asia August 14, 2018

Are cyber security professionals moving to the dark side?

PC World from IDG August 14, 2018

Malwarebytes Global Study examines the true costs of Cybercrime in

Australia

IT-Daily.net August 14, 2018

Die wahren kosten von cyber-kriminalität

Computer Weekly August 13, 2018

Over 146 billions records to be stolen over next five years

PYMNTS.com August 13, 2018

Mid-Sized Biz Most Damaged By Cyberattacks

Qrius August 13, 2018

Mid-sized businesses lose more to cybercrime than large or small ones,

says report

Security Brief Asia August 13, 2018

Security professionals are considering black hat activity - report

The Daily Swig August 10, 2018

Stay humble, keep learning, and have fun

ARN from IDG August 10, 2018

Aussie businesses would spend $166k to remediate a cyber attack

Boan News August 9, 2018

사이버 보안 전문가들, 범죄의 유혹에 시달리고 있다

IT Wire August 9, 2018

Australian firms spend less on security than US, UK, Germany

and Singapore

DARK Reading August 8, 2018

White Hat to Black Hat: What Motivates the Switch to Cybercrime

TechRepublic August 8, 2018

Half of IT pros say it would be easy to turn to cybercrime without getting

caught

Networks Asia August 6, 2018

Spear-phishing - threat vectors highlight new realities

Las Vegas Review Journal August 4, 2018

Black Hat, with big names and crowds, infiltrates Las Vegas

InfoSecurity Magazine July 12, 2018

Departing Employees Should Not Mean Departing Data

American Security Today June 27, 2018

When Employees Leave: Best Practices for Preventing Data Theft

ComputerWorld June 22, 2018

The future of collaboration: all roads leads to channels

IT Brief June 20, 2018

Archive360 expands Microsoft Cloud's information management platform

Markets Insider June 19, 2018

Archive360 Expands and Enhances Archive2Azure, the Intelligent

Information Management Platform for the Microsoft Cloud

HealthIT Security June 8, 2018

Perils of Healthcare Phishing and What You Can Do About It

TechRepublic June 6, 2018

Here are the 2 biggest IT priorities for boards of directors

SC Media June 5, 2018

Are Departing Employees Taking Your Data With Them?

Investment Week May 23, 2018

A procrastinator's guide to GDPR: Five things advisers need to know

Professional Adviser May 18, 2018

A procrastinator's guide to GDPR: Five things advisers need to know

HelpNet Security May 18, 2018

How can Office 365 phishing threats be addressed?

Enterprise Mobility Exchange May 8, 2018

Enterprises still unprepared for new EU data regulation

Niezależna April 30, 2018

Sztuczna inteligencja będzie analizować styl pisania

CyberPress April 27, 2018

Künstliche Intelligenz - Writing Style DNA kontrolliert E-Mails auf

Authentizität

HostReview April 25, 2018

The Smaller Your Business, The Bigger Your Ransomware Threat in 2018

Interia Tech April 23, 2018

Sztuczna Inteligencja Wykryje Oszustwa E-Mail

Hay CANAL April 19, 2018

Trend Micro lanza análisis del estilo de escritura potenciado por IA para

detener el fraude por email

Digital News Asia April 19, 2018

Trend Micro introduces AI-powered cybersecurity

RRHH Press April 18, 2018

Trend Micro lanza una innovadora función para detectar suplantaciones

de directivos en correos electrónicos

Security Brief NZ April 18, 2018

The way you write your emails could now stop BEC scams, thanks to AI

Interempresas April 17, 2018

Trend Micro lanza el primer análisis del estilo de escritura potenciado por

IA para detener el fraude por email

AsiaOne April 17, 2018

Trend Micro Unveils Industry's First AI-Powered Writing Style Analysis to

Halt Email Fraud

Enterprise Innovation April 17, 2018

First AI-powered writing style analysis unveiled to halt email fraud

Apple Daily April 17, 2018

趨勢科技反詐新招:首創「微跡證」AI 鑑識技術,Email 真偽立即分辨

SC Magazine April 16, 2018

GDPR and the State of Employee Data Privacy

Markets Insider April 16, 2018

Trend Micro Unveils Industry's First AI-Powered Writing Style Analysis to

Halt Email Fraud

MediaPost April 16, 2018

Account-Based Email Attacks Are On The Rise

Vanilla Plus April 13, 2018

Account takeover based attacks more than double with 44% of businesses

falling victim

New Orleans City Business April 13, 2018

Outsmarting cyber criminals who hold your computer systems for ransom

BetaNews April 12, 2018

More than 44 percent of businesses fall victim to email account takeovers

Business Wire April 12, 2018

Account Takeover Based Attacks More Than Double with 44% of

Businesses Falling Victim

TechHQ April 9, 2018

What must businesses do to stay competitive with IoT?

Enterprise Mobility Exchange April 8, 2018

Enterprise still unprepared for new EU data regulation

TechGenYZ April 5, 2018

3 Things businesses must do to stay competitive with the Internet of Things

Plus World March 28, 2018

Европейский закон о защите персональных данных GDPR: General

или все же Global?

ECM Connection March 21, 2018

Introducing Colligo Email Manager For Microsoft Office 365

TechRepublic March 20, 2018

The average SMB website is attacked 44 times per day

CSO from IDG March 8, 2018

How benchmarking can make your job much less stressful

Analytics Week March 8, 2018

Possible "Unintended Consequences" of the General Data Protection

Regulation

The Business Times March 7, 2018

Stay Safe

IoT Journal March 6, 2018

Trustwave Report Shows Disparity Between IoT Adoption, Cybersecurity

Readiness

ThreatPost March 6, 2018

IoT Security Disconnect: As Attacks Spike, Device Patching Still Lags

Internet of Business March 5, 2018

Vendors, users ignoring IoT security in rush to market

Information Security Buzz March 2, 2018

New Trustwave Report Shows Dispariy Between IoT Adoption and

Cybersecurity Readiness

HelpNet Security March 2, 2018

Is your IoT strategy creating security holes?

Business Wire February 28, 2018

New Trustwave Report Shows Disparity Between IoT Adoption and

Cybersecurity Readiness

eWeek February 28, 2018

Top Five Ways Security Vulnerabilities Hide in Your IT Systems

TechTarget February 27, 2018

Tech, growing data sets complicate enterprise cybersecurity strategy

Newsmax February 27, 2018

Financial Firms' Flawed Cybersecurity in Dire Need of Change

Data Manager Online February 27, 2018

Ransomware: come proteggersi e cosa fare in caso di attacco

BitMat February 27, 2018

Come proteggersi e cosa fare in caso di attacco ransomware

Tech From The Net February 26, 2018

Stormshield, come difendersi efficacemente dai ransomware

ComputerWorld February 26, 2018

IT liderlerine kurumsal mobilite stratejilerinin geçmisini hatirlatiyoruz!

NoJitter February 15, 2018

Be a Data Security Champion for Your Contact Center

DataQuest February 9, 2018

3 Trends to Take The Data Protection Market By Storm

Security Insider February 8, 2018

Whitelisting als Waffel gegen Ransomware

Image & Data Manager February 8, 2018

Best Practices for Archiving and Securing Social Media

Newsmax February 8, 2018

Financial Firms' Flawed Cybersecurity in Dire Need of Change

IPWatchdog February 3, 2018

Effective data management and governance for social media and cloud

collaboration platforms

CSO from IDG January 29, 2018

When Employees Leave, Make Sure Your Data Doesn't Go With Them

Aiken Standard January 27, 2018

ON THE MONEY: Phishing has grown more sophisticated

Markets Insider January 18, 2018

Chubb Whitepaper Examines Three Top Financial Exposures Private Equity

Dealmakers Face During M&A Transactions

Cision PR Newswire January 18, 2018

Chubb Whitepaper Examines Three Top Financial Exposures Private Equity

Dealmakers Face During M&A Transactions

Les Affaires January 16, 2018  Rançongiciels: vos données cryptées, vos affaires paralysêes 
PharmaBiz.com January 10, 2018  Implications of cyber-attacks on healthcare sector critical 

PHONE: +1 206 683 5683


© 2001-2017 Osterman Research, Inc. All rights reserved.