What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Download now...

Why It Pays to Take a Business-Centric Approach to Compliance: Whitepaper

A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance; particularly with identity management and access governance. Read this whitepaper to learn more.

File Type: .pdf


 

Related Items: To download additional items, select those you are interested in and click the submit button at the bottom of the page. You will be able to download the current item and any additional items you select.

HP Security Research: Cyber Risk Report 2015: Asset

Welcome to the HP Cyber Risk Report 2015. In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.


Cyber Risk Report 2015: Executive Summary: Asset

The 2015 edition of HP’s annual security research Cyber Risk Report details a threat landscape still heavily populated by old problems and known issues, even as the pace of the security world quickens. The environment is one in which well-known attacks and misconfigurations exist side-by-side with mobile malware and connected devices (Internet of Things [IoT]) that remain largely unsecured. As the global economy continues its recovery, enterprises have continued to find inexpensive access to capital; unfortunately, network attackers did as well, some of whom launched remarkably determined and formidable attacks over the course of the year.