Cyber Risk Report 2016 Executive summary

Provided by HP Software

Category Cybercrime

Type White Paper

Length 5

Publish Date February 09 2016

Date posted February 19 2016


Hacker attacks are evolving to target applications and to focus on financial gain. Attacks on Linux, Android, and OS X continue to grow. And government regulations threated to drive legitimate security research underground. Those are some of the findings of this year's deep dive into the cyber threat landscape by HPE Security Research.

Cyber Risk Report 2016 Executive Summary brings you the key findings and conclusions of this year-long research effort. Read it to learn:

  • The evolving nature of cyber crime
  • Why 2015 was the year of collateral damage
  • Why well known problems continue to open the door for hackers
  • How legislation and international events affect the cyber security landscape


HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be view in; SpanishPortuguese, French, German, and Italian.



Thinking Different

Taking baby steps with Big Data

Jon Collins’ in-depth look at tech and society


China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond


CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk


Crowdfunding: Viable alternative to VC funding or glorified marketing?