Cybercrime

2016 Cyber Risk Report

Provided by HPE Software

Category Cybercrime

Type Analyst Report

Length 96

Publish Date February 05 2016

Date posted March 10 2016

Overview

HPE Security Research brings together data and research to produce a detailed picture of both sides of the security coin—the state of the vulnerabilities and threats composing the attack surface, and the ways adversaries exploit those weaknesses to compromise targets. HPE's continuing analysis of threat actors and the methods they employ guides defenders to better assess risk and choose appropriate controls and protections.

In this report HPE provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

 

HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding please review HPE’s privacy statement. Additionally, HPE's privacy statement can be view in; SpanishPortuguese, French, German, and Italian.

Blogs

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?