Cybercrime

Cyber Risk Report 2016 Executive summary

Provided by HP Software

Category Cybercrime

Type White Paper

Length 5

Publish Date February 09 2016

Date posted February 19 2016

Overview

Hacker attacks are evolving to target applications and to focus on financial gain. Attacks on Linux, Android, and OS X continue to grow. And government regulations threated to drive legitimate security research underground. Those are some of the findings of this year's deep dive into the cyber threat landscape by HPE Security Research.

Cyber Risk Report 2016 Executive Summary brings you the key findings and conclusions of this year-long research effort. Read it to learn:

  • The evolving nature of cyber crime
  • Why 2015 was the year of collateral damage
  • Why well known problems continue to open the door for hackers
  • How legislation and international events affect the cyber security landscape

 

HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be view in; SpanishPortuguese, French, German, and Italian.

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?