SlideShare a Scribd company logo
Marcos Ortiz (@marcosluis2186)
50+ facts about State
of
#CyberSecurity
in 2015
AGENDA
This is just a compendium
of the main facts, numbers and
stats
of CyberSecurity Industry
SCOPE
The facts are focused in 4
Sectors:
 
Mobile
 
Cloud
Security 
 
Network
Security 
Internet of
Things
GENERAL
FACTS
The worldwide 
CyberSecurity market is defined by 
market 
sizing estimates 
that range from 
$71 billion in 
2014 to $155+ billion by 2019.
CyberSecurity Market Report Q2 2015 [1]
“Next generation” cybersecurity 
spending could 
reach $15 billion 
to $20 billion 
in the next 3 years.
CyberSecurity Market Report Q2 2015 [1]
Global spending on mobile 
and network security 
estimated at $11 billion annually, 
and growing.
CyberSecurity Market Report Q2 2015 [1]
Cybercrime will 
cost Businesses 
over $2 Trillion by 
2019
Juniper Research's The Future of Cybercrime & Security: Financial and 
Corporate Threats & Mitigation’[2]
Crime involving computers and networks 
has cost the world economy 
more than $445 billion annually, 
according to a 2014 report by the 
Center for Strategic and 
International Studies.
CyberSecurity Market Report Q2 2015 [1]
Demand for (U.S.) 
information security professionals 
is expected to grow 
by 53 % through 
2018.
CyberSecurity Market Report Q2 2015 [1]
APAC spending 
on critical infrastructure security 
is set to hit $22 billion (USD) 
by 2020 
CyberSecurity Market Report Q2 2015 [1]
ABI Research calculates CyberSecurity 
spending for healthcare protection 
will only reach $10 billion 
globally by 2020, just under 
10% of total spend on 
critical infrastructure security. 
CyberSecurity Market Report Q2 2015 [1]
According to CB Insights, 
in the last 5 years, 
$7.3 billion has been invested into 
1,208 private CyberSecurity startups.  
CBInsights [3]
“In summary, based on my years of experience in the field of 
Telecommunications and Cyber Security, 
I see this next generation of big data streaming analytics 
as perhaps the only solution that could
 protect against future cyber­attacks in enterprise, 
critical infrastructure, telecommunications 
and even government computers and servers and 
massive applications, even down to 
SCADA (Supervisory Control and Data Acquisition) 
systems including smart cities and the world 
of IoT with 50B devices connected to the internet. ” 
    Dr. Hossein Eslambolchi [4]
MOBILE
devices are 
infected
With 
Mobile surveillance and
Mobile Remote Access Trojans 
(mRATs)
1 in 1000
Check Point Software Technologies Threat Research: “Targeted Attacks
On Enterprise Mobile” [5]
of businesses suffered 
Mobile
Security incidents 
costing 
more
than $250,000
to re mediate
42%
Check Point Software Technologies's Security Report 2015 [6]
new Android 
Malware
Samples 
everyday
4,900
GData's Mobile Malware Report Q1 2015 [7]
Out of Ten of Millions of 
devices, the number of
ones infected with 
truly malicious exploits
was negligible0,03%
Verizon's  2015 Data Breach Investigations Report [8]
Is the Quantity of downloaded 
Android 
apps which are vulnerable
to remote attacks like 
JBOH
(JavaScript­Binding­Over­HTTP)
5 B
FireEye's  Mobile Threat Assessment Report [9]
of Android apps have 
at least one 
high­risk security rating 
48 %
FireEye's  Mobile Threat Assessment Report [9]
Of organizations do not 
manage 
corporate data on
Employee­owned
devices
44%
Check Point Software Technologies's Security Report 2015 [6]
Of app developers
do not test their apps
for Security
33%
Check Point Software Technologies Security Report 2015 [6]
Is the Quantity of downloaded 
Android 
apps which are vulnerable
to remote attacks like 
JBOH
(JavaScript­Binding­Over­HTTP)
5 B
FireEye's  Mobile Threat Assessment Report [9]
A 2011 viaForensics 
study 
found 
of popular apps 
sampled
stored data insecurely
83%
NowSecure's  Secure Mobile Development [10]
Most Popular
Apps
that's don't encrypt 
data
Top 10
Skyhigh Networks's How to Thwart Hackers and the NSA with Encryption [11]
of Android devices
could be affected
by
dangerous Stagefright
bug
95%
Zimperium [12]
CLOUD
SECURITY
Average number of
Cloud services
in use by
company
923
Skyhigh Networks's Cloud Adoption & Risk Report Q1 2015 [13]
We found of companies
present a high cyber
Security risk
to their partners
8%
Skyhigh Networks's Cloud Adoption & Risk Report Q1 2015 [13]
But of data shared 
with partners
is uploaded
to high­risk partners
29%
Skyhigh Networks's Cloud Adoption & Risk Report Q1 2015 [13]
While of 91 % providers
encrypt data in transit
between the cloud service
and end user, just 
encrypt data stored at rest
in the cloud 
10%
Skyhigh Networks's Cloud Adoption & Risk Report Q1 2015 [13]
In 2013,
The market for Cloud Security
solutions was USD
and is estimated to
grow at a healthy
rate of 16% till 2018
3.47 B
ResearchFox's Cloud Security Market – Outlook (2014 ­ 2018) [14]
90% of companies
have security concerns about 
Cloud Computing and
36% of companies
believe Cloud apps are less secure
than on­premise apps
Bitglass's The Definitive Guide to Cloud Access Security Brokers [15]
Of respondents,
say none of the security threat
defenses used are 
administered
through cloud­based 
services
13%
Cisco's Annual Security Report 2015 [16]
NETWORK
SECURITY
Of organizations
studied were infected
With bots.
and a bot communicates 
with a C&C every minute83%
Check Point Technologies 's Security Report 2015 [6]
DdoS attacks ocurred
every day in 2014
48
Check Point Technologies 's Security Report 2015 [6]
of critical infrastructure
companies
suffered a security breach
over the last year
70%
SecurityWeek [17]
Open Source vulnerabilities 
like Heartbleed, Poodle and Shellshock
affected nearly every IT operation
in the world
Check Point Technologies 's Security Report 2015 [6]
Financial Trojans continue to be some 
of the most lucrative tools
for cybercrime gangs.
Symantec 's Dyre: Emerging threat on financial fraud landscape [18]
Estimated financial lost
from 700M compromised
records shows
the real importance
of managing data breach risks
400M
Verizon's 2015 Data Investigations Report [8]
Of Web Apps attacks
involve harvesting 
credentials stolen from
customer devices, then
logging to web apps with them
95%
Verizon's 2015 Data Investigations Report [8]
Akamai 's Q1 2015 State of the Internet Report [19]
Akamai 's Q1 2015 State of the Internet Report [19]
Many DdoS rely on improperly 
secured services, such as NTP, DNS
and SSDP, which make it possible
for attackers to spoof source IP address
Verizon's 2015 Data Investigations Report [8]
NTP topped the list with
max attack bandwidth hitting
325 Gbps, with SSDP
jumping on the DoS boat for a
134 Gbps cruise
Verizon's 2015 Data Investigations Report [8]
The adoption of IPv6 has introduced
new attack vectors 
for companies, because many threats 
previously considered mitigated in IPv4
were able to bypass firewalls and other 
Security measures on IPv6
Akamai 's Q1 2015 State of the Internet Report [19]
The two most observed web application
attack vectors were
Local File Inclusion (LFI), at 66%, 
and SQL Injection (SQLi), 
at 29%.
Akamai 's Q1 2015 State of the Internet Report [19]
INTERNET
OF
THINGS
IoT is a key enabling technology 
for digital businesses. 
Approximately 3.9 billion connected 
things were in use in 2014 and 
this figure 
is expected to rise to 25 billion by 2020. 
And while deployment is growing, 
there are factors slowing down the rate of adoption. 
  
Gartner's Market Research [20]
IoT devices are actively penetrating
some of the world's most regulated
industries including healthcare, 
energy infrastructure, government, 
Financial services and retail
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Some infrastructure hosting IoT data
are susceptible to highly­publicized 
and patchable vulnerabilities such as
FREAK and Heartbleed
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
While most IoT infrastructure 
is running on top of 
modern service providers like 
Amazon, SoftLayer,
Verizon and others, OpenDNS Security Labs 
discovered that some 
providers are also hosting malicious
domains.
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Samsung Smart TVs use untrusted 
certificates for
Its infolink.pavv.co.kr 
domain
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Healthcare, Retail, 
High Education and Oil & Gas 
are the
Top Industry Verticals using
Dropcam devices
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Looking at our data, 
the top five autonomous systems 
hosting IoT infrastructure sites are 
AS36351 (Softlayer
Technologies, Inc.), 
AS16509 (Amazon.com, Inc.),
AS702 (Verizon Business/UUnet Europe), 
AS14618 (Amazon.
com, Inc.),
and AS54113 (Fastly).
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Another finding was that 
184 unique FQDNs
were found to be susceptible 
to CVE­2015­0204
­­more commonly
referred to as the the FREAK attack.
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
A deep analysis of the 
widgets.iobridge.com FQDN using
Qualys SSL Labs' online scanner 
provided a poor result of Grade F
for SSL ciphers.
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
A simple scan with nmap of the 
widgets.iobridge.com FQDN  showed
the result of
many services that could be potentially
exploited to gain access to the
Widget server
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Our data shows that not all wd2go.com 
domains are vulnerable,
However.
of the 70 unique MyCloud storage
endpoints,
only 30 were found to 
be vulnerable to CVE­2015­0204. 
OpenDNS's The 2015 Internet of Things in the Enterprise Report [21]
Areas to watch:
­ WI­FI Jamming
­ Password strengh, Reuse and 
Attack Resistance
­ Unencrypted and unauthenticated comms
­ Misconfiguration of Encryption 
Synack's Home Automation Benchmarking Report [22]
Areas to watch:
­ WI­FI Jamming
­ Password strengh, Reuse and 
Attack Resistance
­ Unencrypted and unauthenticated comms
­ Misconfiguration of Encryption 
Synack's Home Automation Benchmarking Report [22]
“In our research at IOActive Labs, we constantly find 
very vulnerable technology being used 
across different industries. This same technology also 
is used for critical infrastructure without 
any security testing. Although cities usually 
rigorously test devices and systems for functionality,
resistance to weather conditions, and so on,
there is often little or no cyber security testing at all,
which is concerning to say the least.”
 
Cerrudo's An Emerging US (and World) Threat: Cities Wide Open to CyberAttacks[23]
DATA
EXTRACTED
FROM
LINKS
[1] CyberSecurity Market Report Q2 2015
[2] Juniper Research's The Future of Cybercrime & Security
[3] CBInsights
[4] Anomalytics & CyberSecurity in the 21st Century
[5] Check Point Threat Research´s Targeted Attacks On Enterprise Mobile
[6] Check Point Software Technologies's Security Report 2015
[7] GData's Mobile Malware Report Q1 2015
[8] Verizon's  2015 Data Breach Investigations Report
[9] FireEye's  Mobile Threat Assessment Report
[10] NowSecure's  Secure Mobile Development 
[11] Skyhigh Networks's How to Thwart Hackers and the NSA with Encryption
[12] Zimperium 
[13] Skyhigh Networks's Cloud Adoption & Risk Report Q1 2015 
[14] ResearchFox's Cloud Security Market – Outlook (2014 ­ 2018)
[15] Bitglass's The Definitive Guide to Cloud Access Security Brokers 
[16] Cisco's Annual Security Report 2015 
[17] SecurityWeek 
[18] Symantec 's Dyre: Emerging threat on financial fraud landscape 
[19] Akamai 's Q1 2015 State of the Internet Report
[20] Gartner's Market Research 
[21] OpenDNS's The 2015 Internet of Things in the Enterprise Report 
[22] Synack's Home Automation Benchmarking Report 
[23] An Emerging US (and World) Threat: Cities Wide Open to CyberAttacks 
 

More Related Content

What's hot

2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
Nyotron
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsState of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
Comodo SSL Store
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
Nandita Nityanandam
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
Bradford Sims
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
Mohamed Zaheer Husain
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
SrikanthRaju7
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
Internetwork Engineering (IE)
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
redteamacademypromo
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
Cybersecurity Education and Research Centre
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Cigniti Technologies Ltd
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
Dr David Probert
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
Rama Reddy
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...ProductNation/iSPIRT
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
Dr David Probert
 

What's hot (20)

2018 Cybersecurity Predictions
2018 Cybersecurity Predictions2018 Cybersecurity Predictions
2018 Cybersecurity Predictions
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
State of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top PredictionsState of Cybersecurity in 2018 - Our Top Predictions
State of Cybersecurity in 2018 - Our Top Predictions
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
Uniken Presentation for IT Minister @iSPIRT Event - Conclave for India as Pro...
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 

Similar to 50+ facts about State of CyberSecurity in 2015

Cyberattacks on the Rise Infographic
Cyberattacks on the Rise InfographicCyberattacks on the Rise Infographic
Cyberattacks on the Rise Infographic
SparkCognition
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
Sam Ghosh
 
Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)
Koncept Analytics
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
Ashish Chauhan
 
P04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdfP04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdf
ShyampratapSingh13
 
Public Safety and Security Market
Public Safety and Security MarketPublic Safety and Security Market
Public Safety and Security Market
poonamdhobale69
 
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
SlideTeam
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
Neil Dave
 
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksThe cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risks
Daxue Consulting
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
Bankir_Ru
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2
Marcio Kanamaru
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
IRJET Journal
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure  Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure
James Nesbitt
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
Internet of Things - Disrupting Industries and Society
Internet of Things  - Disrupting Industries and SocietyInternet of Things  - Disrupting Industries and Society
Internet of Things - Disrupting Industries and Society
CMS IT SERVICES (Admin)
 
The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionage
Bee_Ware
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
SG Analytics
 
McKinsey Global Institute: China’s digital transformation, executive summary
McKinsey Global Institute: China’s digital transformation, executive summaryMcKinsey Global Institute: China’s digital transformation, executive summary
McKinsey Global Institute: China’s digital transformation, executive summaryVIRGOkonsult
 

Similar to 50+ facts about State of CyberSecurity in 2015 (20)

Cyberattacks on the Rise Infographic
Cyberattacks on the Rise InfographicCyberattacks on the Rise Infographic
Cyberattacks on the Rise Infographic
 
Emerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in IndiaEmerging Cyber Security Opportunity in India
Emerging Cyber Security Opportunity in India
 
Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)
 
Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...Latin america cyber security market,symantec market share internet security,m...
Latin america cyber security market,symantec market share internet security,m...
 
P04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdfP04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdf
 
Public Safety and Security Market
Public Safety and Security MarketPublic Safety and Security Market
Public Safety and Security Market
 
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
Coronavirus Impact Assessment And Mitigation Strategies In ICT Industry Compl...
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
 
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksThe cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risks
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2Rp economic-impact-cybercrime2
Rp economic-impact-cybercrime2
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure  Industrial Control Cybersecurity for Critical National Infrastructure
Industrial Control Cybersecurity for Critical National Infrastructure
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Internet of Things - Disrupting Industries and Society
Internet of Things  - Disrupting Industries and SocietyInternet of Things  - Disrupting Industries and Society
Internet of Things - Disrupting Industries and Society
 
The economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionageThe economic impact of cybercrime and cyber espionage
The economic impact of cybercrime and cyber espionage
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
McKinsey Global Institute: China’s digital transformation, executive summary
McKinsey Global Institute: China’s digital transformation, executive summaryMcKinsey Global Institute: China’s digital transformation, executive summary
McKinsey Global Institute: China’s digital transformation, executive summary
 

More from Marcos Ortiz Valmaseda

SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
SEC: Actualización de la definición de "Inversor Acreditado" en el 2019SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
Marcos Ortiz Valmaseda
 
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
Marcos Ortiz Valmaseda
 
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security
Marcos Ortiz Valmaseda
 
200 Global Facts about the State of Small Businesses in 2015
200 Global Facts about the State of Small Businesses in 2015200 Global Facts about the State of Small Businesses in 2015
200 Global Facts about the State of Small Businesses in 2015
Marcos Ortiz Valmaseda
 
The future of marketing
The future of marketingThe future of marketing
The future of marketing
Marcos Ortiz Valmaseda
 
Introducción a Apache HBase
Introducción a Apache HBaseIntroducción a Apache HBase
Introducción a Apache HBase
Marcos Ortiz Valmaseda
 
Research group in databases technologies
Research group in databases technologiesResearch group in databases technologies
Research group in databases technologies
Marcos Ortiz Valmaseda
 
Postgre Sql Para Las Empresas Cubanas
Postgre Sql Para Las Empresas CubanasPostgre Sql Para Las Empresas Cubanas
Postgre Sql Para Las Empresas Cubanas
Marcos Ortiz Valmaseda
 
Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0Marcos Ortiz Valmaseda
 

More from Marcos Ortiz Valmaseda (9)

SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
SEC: Actualización de la definición de "Inversor Acreditado" en el 2019SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
SEC: Actualización de la definición de "Inversor Acreditado" en el 2019
 
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
A Partnership with Adyen is Equal to Exponential Growth: 17 Payments Experts ...
 
7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security7 Ideas to Revamp Product Marketing at Duo Security
7 Ideas to Revamp Product Marketing at Duo Security
 
200 Global Facts about the State of Small Businesses in 2015
200 Global Facts about the State of Small Businesses in 2015200 Global Facts about the State of Small Businesses in 2015
200 Global Facts about the State of Small Businesses in 2015
 
The future of marketing
The future of marketingThe future of marketing
The future of marketing
 
Introducción a Apache HBase
Introducción a Apache HBaseIntroducción a Apache HBase
Introducción a Apache HBase
 
Research group in databases technologies
Research group in databases technologiesResearch group in databases technologies
Research group in databases technologies
 
Postgre Sql Para Las Empresas Cubanas
Postgre Sql Para Las Empresas CubanasPostgre Sql Para Las Empresas Cubanas
Postgre Sql Para Las Empresas Cubanas
 
Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0Estado del Desarrollo de PostgreSQL-9.0
Estado del Desarrollo de PostgreSQL-9.0
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

50+ facts about State of CyberSecurity in 2015