Cybercrime

Cyber Risk Report 2016 Executive summary

Provided by HP Software

Category Cybercrime

Type White Paper

Length 5

Publish Date February 09 2016

Date posted February 19 2016

Overview

Hacker attacks are evolving to target applications and to focus on financial gain. Attacks on Linux, Android, and OS X continue to grow. And government regulations threated to drive legitimate security research underground. Those are some of the findings of this year's deep dive into the cyber threat landscape by HPE Security Research.

Cyber Risk Report 2016 Executive Summary brings you the key findings and conclusions of this year-long research effort. Read it to learn:

  • The evolving nature of cyber crime
  • Why 2015 was the year of collateral damage
  • Why well known problems continue to open the door for hackers
  • How legislation and international events affect the cyber security landscape

 

HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be view in; SpanishPortuguese, French, German, and Italian.

Blogs

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you use any voice/digital assistants to help you work?