Cyber Risk Report 2016: Executive Summary

Hacker attacks are evolving to target applications and to focus on financial gain. Attacks on Linux, Android, and OS X continue to grow. And government regulations threated to drive legitimate security research underground. Those are some of the findings of this year’s deep dive into the cyber threat landscape by HPE Security Research.

Cyber Risk Report 2016 Executive Summary brings you the key findings and conclusions of this year-long research effort. Read it to learn:

• The evolving nature of cyber crime
• Why 2015 was the year of collateral damage
• Why well known problems continue to open the door for hackers
• How legislation and international events affect the cyber security landscape
Hewlett_Packard_Enterprise_logo.svg

  • Complete the form for immediate access

  • HPE is the sponsor of this material. By submitting your information you agree to be contacted by HPE on topics of interest. Before deciding, please review HPE’s privacy statement.