PUBLICATION
|
DATE
|
ARTICLE
|
Baseline
|
December 28, 2015
|
Managers on the Fence About Unified Communications
|
Digital4
|
December 23, 2015
|
Shelfware: ecco come evitare di acquistare software
inutile o
inutillizzato
|
DDaily
|
December 22, 2015
|
[기고] 기업 CIO, 사내 개인용 솔루션 사용 전략 재점검 해야
|
Government Technology
|
December 17, 2015
|
5 Cyber-Risk Trends CIOs Should Keep in Mind for 2016
|
Business Wire
|
December 16, 2015
|
ISACA Identifies Five Cyber Risk Trends for 2016
|
eWeek
|
December 13, 2015
|
Retailers Lack Proper Security Control and Visibility, Report
Finds
|
Information Management
|
December 9, 2015
|
Retail Report Shows False Sense of
Confidence Over Data
Security
|
CIO Insight
|
December 9, 2015
|
How Retailers Jeopardize Security With Temps
|
Business Solutions
|
December 9, 2015
|
Retailers Face Security Holes This Holiday Shopping Season
|
CSO Online
|
December 8, 2015
|
Osterman study highlights false sense of
security in the retail
sector
|
TechTarget (SearchSecurity)
|
December 8, 2015
|
Temporary workers cause access management troubles over
the
holidays
|
DARK Reading
|
December 8, 2015
|
Retailers Inadequately Secured Against Risks From
Temporary
Workers
|
eSecurity Planet
|
December 8, 2015
|
Over
a Third of U.S. Retailers Don't Know Which Systems Their
Temporary
Workers Have Accessed
|
Market Wired
|
December 8, 2015
|
New Cyber Risk Report Discloses Gaping Holes
in Retailers'
Information Security
|
eWeek
|
November 29, 2015
|
10 Things to Look for in a Business Email Provider
|
Computerworld
|
November 12, 2015
|
Apple wants a little iOS in every enterprise
|
PRNewswire
|
November 12, 2015
|
DataMotion
Hosts Webinar Featuring Osterman Research on
Content
Encryption, Key Issues to Consider and Best Practices
|
Market Wired
|
November 11, 2015
|
Metalogix Named in Osterman
Research Report as an Essential
Cloud Management Software Provider
to Enhance Office 365
|
IT Business Edge
|
November 5, 2015
|
Why the Unified Communications Ecosystem is So Odd
|
eWeek
|
November 5, 2015
|
Businesses Hesitant About Migration to Unified Communications
|
ITProPortal
|
October 31, 2015
|
Taking back control of your corporate data
|
IT Business Edge
|
|
4 Issues Companies Should Address Before Adopting a UC
Platform
|
Computerworld
|
October 30, 2015
|
Como assumir o controle do compartilhamento de informações
na sua empresa
|
TNI
|
October 27, 2015
|
Hacia un nuevo CIO
|
MIS Asia
|
October 27, 2015
|
Poor disposal of mobile devices creates massive security risk
|
BusinessWire
|
October 20, 2015
|
ownCloud Unveils First and Only Flexible Hybrid Cloud
Enterprise File Sync & Share Solution with on-Premise
Control
Plane
|
Notícias
|
October 18, 2015
|
4 dicas para reduzir riscos com
ferramentas de sincronização e
compartilhamento
|
Banking Exchange
|
October 14, 2015
|
October: A month to measure cyber defenses
|
Security Info Watch
|
October 14, 2015
|
FTC Throws Down the Cyber Security Gauntlet
|
CSO
|
October 7, 2015
|
Quarter of films can't tell how hackers get in
|
IT World
|
October 7, 2015
|
Quarter of films can't tell how hackers get in
|
Sys-Con Media
|
October 6, 2015
|
Osterman Research and DataMotion Whitepaper and Survey
Address Content Encryption Best Practices
|
IT News Africa
|
October 6, 2015
|
It's time for CIOs to change strategy in the fight against
consumer
tech
|
Biztech Africa
|
October 6, 2015
|
Time for CIOs to change strategy in the fight against consumer
technology
|
Computerworld
|
October 5, 2015
|
Gestão de soluções FSS em ambiente empresarial
|
MakeUseOf
|
October 5, 2015
|
5 Devices
You Do NOT Want to Connect to the Internet of Things
|
CSO
|
October 2, 2015
|
Execs blame security breaches on user behavior, executive
leadership: CyberArk
|
InfoSecurity
|
October 1, 2015
|
The Long
Goodbye
|
IBN
|
September 30, 2015
|
KnowBe4 Phishing Research Shows Men 225% More Prone to
Give up the Goods
|
DarkReading
|
September 29, 2015
|
Why Many Organizations Still Don't Use Threat
Intelligence
Portals
|
Cloud Hub
|
September 22, 2015
|
IBM launches Cloud Security Enforcer to lockdown shadow IT
|
Partner Marketing
|
September 17, 2015
|
You've Got Email (Malware)
|
IT World Canada
|
September 8, 2015
|
Companies battle for control with consumer-grade file
sharing
systems
|
Business Cloud News
|
September 8, 2015
|
Microsoft unveils cloud security plans for Adallom amid
rising
cloud unrest
|
CloudTech
|
September 7, 2015
|
More than three quarters of firms concerned over
consumer
grade cloud storage
|
Windows IT Pro
|
August 18, 2015
|
New report slams Office 365 compliance features unfairly
|
Idaho Business Review
|
August 5, 2015
|
The 3 top security issues your firm needs to address
|
BusinessWire
|
August 4, 2015
|
Smarsh Offers Enhanced Archiving Support for Microsoft
Office
365 Environments
|
Channelnomics
|
July 31, 2015
|
Compliance, Offie 365 needs call for partner assistance
|
Credit Union Times
|
July 21, 2015
|
KnowBe4
Automates Security Training
|
ITProPortal
|
July 13, 2015
|
High-profile breaches spark explosive demand for security
awareness training
|
ITProPortal
|
July 12, 2015
|
Cloudy with a chance of data loss: Has corporate IT lost control?
|
DarkReading
|
June 30, 2015
|
Spikes Security Introduces Isla, Web Malware Isolation
System
|
The Legal Intelligencer
|
June 23, 2015
|
Cybersecurity Threat-Sharing in the Legal
Community
|
Above the Law
|
May 20, 2015
|
Phishing and Malware Cyberattacks are
Directed at Law Firms
(and Clients) - So it's Time to Train
Employees
|
FierceMobileIT
|
May 20, 2015
|
Good Technology gives employees mobile email tool to work with
Office documents
|
Lexology
|
May 12, 2015
|
Phishing and malware cyberattacks are directed at law firms (and
clients) - so it's time to train employees
|
Sys-Con Media
|
May 7, 2015
|
Breach Response Plans Often Overlooked in Higher Education
|
Fierce Content Management
|
April 29, 2015
|
Are you archiving your Web content? You should be
|
Fox News
|
April 18, 2015
|
Hacking into your home: TVs, refrigerators could be
portal to most
sensitive info
|
BCW
|
April 16, 2015
|
Zscaler Introduces
World's First Cloud-Based Next Generation
Firewall with
Zscaler Winter 2015
|
CSO
|
March 26, 2015
|
Survey: 75% of firms would take hours or longer to spot
breach
|
Business Solutions
|
March 26, 2015
|
Study Shows Phishing Is Directly Related To 83% Of Security
Concerns
|
Mother Nature Network
|
March 18, 2015
|
Is your smart home safe or has it become an evil botnet?
|
PlumChoice
|
March 17, 2015
|
PlumChoice: Cloud Application Success Requires
Increased
Support for Product Adoption and Ongoing Use
|
CIO
|
March 12, 2015
|
Addressing Your Shelfware Problems Can Help You Get
Good
Cyber Security
|
Security Asia
|
March 2, 2015
|
Is your security software sitting unused on the shelf?
|
CIO
|
February 26, 2015
|
Is Your Security Software Sitting Unused on the Shelf?
|
PR.com
|
February 26, 2015
|
Osterman Research Finds a Lack of Good Information Governance
Increases Corporate Costs and Risk
|
Virtual-Strategy Magazine
|
February 25, 2015
|
South River Technologies and
Osterman Research: Enterprise IT Is
Losing Control Over Business
Data
|
MarketWired
|
February 25, 2015
|
South River Technologies and
Osterman Research: Enterprise IT Is
Losing Control Over Business
Data
|
Virtual-Strategy Magazine
|
February 24, 2015
|
Osterman Research Finds Most
Organizations at Significant Risk
from Use of Consumer File Sync
and Share Tools
|
ElectroPages
|
February 19, 2015
|
The BYOD ethos is a corporate cyber attack waiting to happen
|
ChinaByte.com
|
February 6, 2015
|
你的企业有多少安全软件只是“摆设”?
|
Reseaux Telecoms
|
January 29, 2015
|
28% des logiciels de sécurité achetés
par les entreprises ne sont
pas utilisés
|
Open Systems Publications
|
January 29, 2015
|
Osterman: до 60% купленных для защиты компьютеров
программ остаются неиспользованными
|
CSO
|
January 27, 2015
|
Twenty-eight percent of security spending wasted on shelfware
|
Newsfactor
|
January 23, 2015
|
New Zero-Day Flaws Found in Adobe Flash
|
TechTarget Search Security
|
January 21, 2015
|
Wasted spending on security shelfware affects small
businesses
more
|
Politico Morning Cybersecurity
|
January 21, 2015
|
Report Watch
|
Boan News
|
January 21, 2015
|
각종 보안예산, 밑 빠진 독에 물 붓기 상태
|
Security Week
|
January 20, 2015
|
Security Spending Wasted When Software Goes Unimplemented
|
Dark Reading
|
January 16, 2015
|
A Lot of Security Purchases Remain Shelfware
|
Corporate Counsel
|
January 16, 2015
|
If It Stays on the Shelf, Security
Software Won't Help
|
PaymentsSource
|
January 16, 2015
|
Many Security Software Investments Are Wasted:
Trustwave
|
MSPmentor
|
January 16, 2015
|
Trustwave: Smaller Organizations Spend More on IT
Security
Than Others
|
Business News Daily
|
January 16, 2015
|
Is Your Small
Business Wasting Money on Security?
|
Talkin' Cloud
|
January 15, 2015
|
Are Some Organizations Leaving IT Security Software "On
the
Shelf"?
|
eWeek
|
January 14, 2015
|
Security Shelfware Continues to Be a Big Challenge
|
Entrepreneur
|
January 7, 2015
|
The Top 5 Cloud IT Challenges Facing Businesses in 2015
|