Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

HP releases 2013 Cyber Risk Report

markpainter ‎02-05-2014 01:18 PM - edited ‎07-07-2015 09:23 AM

Earlier this week the HP 2013 Cyber Risk Report was released. So far, it's been covered in featured articles in the Wall Street Journal, Bloomberg Business Week, and SC Magazine, to name but a few. In other words, it's kind of a big deal. So why is it so important?

 

For one, the report examines the specific things that leave organizations vulnerable to attack. It's the culmination of a year's worth of real world testing of applications (both traditional and mobile) and research conducted by the HP Security Research group (HPSR) in multiple areas of focus. It examines  both the nature of the vulnerabilities that leave organizations unsafe (the organization’s “attack surface”) and how adversaries currently abuse those vulnerabilities. It challenges readers to think specifically about how their organization is most likely to be attacked - and how to best allocate security funds to counter those threats.

 

Among a small sampling of the key report findings:

 

 

 

 

 

 

 

 

 

 

 

 

•56% of the applications tested exhibited weaknesses to revealing information about the application, its implementation or its users.
•74% of applications exhibit unnecessary permissions.
•80% of applications are vulnerable to misconfiguration vulnerabilities.
•Hybrid development frameworks for mobile apps don’t address many well-known security issues.

 

The full report has in-depth information concerning those findings, and much, much more. To register to download the report, visit HP 2013 Cyber Risk Report.

0 Kudos
About the Author

markpainter

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Events
Aug 29 - Sep 1
Boston, MA
HPE Big Data Conference 2016
Attend HPE’s Big Data Conference to learn from peers in every industry and hear from Big Data experts and thought leaders in an exciting, energy fille...
Read more
Sep 13-16
National Harbor, MD
HPE Protect 2016
Protect 2016 is our annual conference and is the place to meet the world’s top information security talent, discuss new products and share information...
Read more
View all