The 2016 IBM Cyber Security Intelligence Index is now available. Download the  complete report today.

IBM continuously monitors billions of security events every year for clients in more than 100 countries, which means we can give you a clear picture of what the cyber threat landscape looks like today.

Get all the details from IBM’s annual Cyber Security Intelligence Index report, based on data we collected from over 8,000 client devices around the world. Read the report find out more about:

  • The volume of attacks that occurred in 2014
  • The most affected industries and countries
  • The most prevalent types of attacks, attackers and industries
  • The key factors that enable these attacks

You’ll also get information on the impact that security breaches are having on companies today, and what you can do now to help prevent them from happening to your organization.

Read the IBM 2016 Cyber Security Intelligence Index

More from X-Force

Getting “in tune” with an enterprise: Detecting Intune lateral movement

13 min read - Organizations continue to implement cloud-based services, a shift that has led to the wider adoption of hybrid identity environments that connect on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices in these hybrid identity environments, Microsoft Intune (Intune) has emerged as one of the most popular device management solutions. Since this trusted enterprise platform can easily be integrated with on-premises Active Directory devices and services, it is a prime target for attackers to abuse for conducting…

You just got vectored – Using Vectored Exception Handlers (VEH) for defense evasion and process injection

10 min read - Vectored Exception Handlers (VEH) have received a lot of attention from the offensive security industry in recent years, but VEH has been used in malware for well over a decade now. VEH provides developers with an easy way to catch exceptions and modify register contexts, so naturally, they’re a ripe target for malware developers. For all the attention they’ve received, nobody had publicized a way to manually add a Vectored Exception Handler without relying on the built-in Windows APIs which…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today
Press play to continue listening
00:00 00:00