Cybercrime

Cyber Risk Report 2016 Executive summary

Provided by HP Software

Category Cybercrime

Type White Paper

Length 5

Publish Date February 09 2016

Date posted February 19 2016

Overview

Hacker attacks are evolving to target applications and to focus on financial gain. Attacks on Linux, Android, and OS X continue to grow. And government regulations threated to drive legitimate security research underground. Those are some of the findings of this year's deep dive into the cyber threat landscape by HPE Security Research.

Cyber Risk Report 2016 Executive Summary brings you the key findings and conclusions of this year-long research effort. Read it to learn:

  • The evolving nature of cyber crime
  • Why 2015 was the year of collateral damage
  • Why well known problems continue to open the door for hackers
  • How legislation and international events affect the cyber security landscape

 

HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be view in; SpanishPortuguese, French, German, and Italian.

Blogs

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?