In the face of increasing threats, software vendors continue to make it more difficult for attackers with the implementation of security mitigations. However, these mitigations are not enough when they are built on inherently vulnerable legacy code. This white paper from Hewlett Packard Enterprise provides a threat landscape overview for the last 12 months.
HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be viewed in; German, and Italian.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond