• About yourself 
  • Download

Cyber Security Research - Cyber Risk Report 2015

PDF 2.0 MB | 74 pages
Overview

This report shows findings of cyber security research and provides a thorough understanding of imminent cyber security threats.

This report draws on data from HP security teams, open source intelligence, ReversingLabs, and Sonatype to cover 7 main topics:

1. Well-known attacks are still commonplace.

2. Misconfigurations are still “a thing.”

3. Newer technologies...

This report shows findings of cyber security research and provides a thorough understanding of imminent cyber security threats.

This report draws on data from HP security teams, open source intelligence, ReversingLabs, and Sonatype to cover 7 main topics:

1. Well-known attacks are still commonplace.

2. Misconfigurations are still “a thing.”

3. Newer technologies introduce newer avenues of attack.

4. Determined adversaries gain.

5. Cyber-security legislation is on the horizon.

6. There are challenges for secure coding.

7. Complementary protection technologies are available.

image | 4AA5-0858ENW Click to enlarge
  Close Overlay
Introduction
2
The security conversation
6
Threat actors
8
Vulnerabilities and exploits
13
Threats
24
Risks: Spotlight on privacy
40
Exposures
42
Controls
49
Summary
66
Authors and contributors
68
Glossary
69
Tell us about yourself
Required *
 
+