-

Cybersecurity in Government – webinar with BIO-key International
Discussion between Osterman Research and BIO-key on current trends and issues with cybersecurity preparedness in the government sector. Webinar hosted by BIO-key. Continue Reading
-

Exposing Software Supply Chain Security Blind Spots – webinar with GrammaTech
Presenting the findings of our recent report on security blind spots in the software supply chain. Webinar hosted by GrammaTech. Continue Reading
-

Critically Vulnerable Open Source Code Found in COTS Apps – interview with Shift Left Academy
Discussing the findings on vulnerable open-source components in commercial off-the-shelf software. A conversation between Deb Radcliff for GrammaTech’s Shift Left Academy and Michael Sampson from Osterman Research. Continue Reading
-

How to Reduce the Risk of Phishing and Ransomware – webinar with Avanan
Webinar on reducing the risk of phishing and ransomware, hosted by Avanan. Continue Reading
-

Are Native Archiving and Data Protection Capabilities Enough for Modern Collaboration? – webinar with IPRO
Discussion on the efficacy of native archiving and data protection capabilities in Microsoft Teams, and where third-party solutions offer better value. Presented in conjunction with IPRO. Continue Reading
-

How to Reduce the Risk of Phishing and Ransomware – webinar with TitanHQ
Webinar on reducing the risk of phishing and ransomware, hosted by TitanHQ. Continue Reading
-

Addressing Microsoft Teams Compliance – webinar with ZL Tech
Webinar on managing the data in Microsoft Teams for compliance, privacy, and eDiscovery. Presented in conjunction with ZL Tech. Continue Reading
-

Risks and Challenges of Deploying Microsoft Teams – webinar with Theta Lake
Webinar on the archiving and data protection challenges of Microsoft Teams. Presented in conjunction with Theta Lake. Continue Reading
-

Cybersecurity in Education – podcast with BIO-key International
A discussion with Kimberly Johnson from BIO-key International on the current status and trends with cybersecurity in education. Continue Reading
