Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

HP

Below you will find reports with the source of “HP”

image from Smartly Selected Infrastructure For GDPR Compliance

Smartly Selected Infrastructure For GDPR Compliance

This white paper will describe how the right infrastructure foundation can assist GDPR compliance, while contributing to your company’s stature in the digital age, as well as offer a checklist to ensure that new IT infrastructure purchases effectively support GDPR compliance.

(more available)
Added: October 21, 2018
image from The Business Of Hacking

The Business Of Hacking

This paper will explore the business of hacking: the different ways people make money by hacking, the motivations, the organization. It will break down the businesses’ profitability and risk levels, and provide an overall SWOT analysis. From this, opportunities for disruption will be discussed and a competitive approach for disrupting the business of hacking will be laid out.

(more available)
Added: October 21, 2018
image from 2016 Cost of Cyber Crime Study & the Risk of Business Innovation

2016 Cost of Cyber Crime Study & the Risk of Business Innovation

From the report, “Cyber attacks are a reality for all organizations. In this year’s cost of cyber crime research they focus on the importance of thriving and innovating while simultaneously reducing the financial and reputational consequences of a cyber attack. An important finding of this research is that a high security profile, as determined by the deployment of specific practices and technologies, will support business innovation and reduce the cost of cyber crime.”

(more available)
Added: October 20, 2018
image from 2017 State of Security Operations

2017 State of Security Operations

In this fourth annual State of Security Operations report, Hewlett Packard Enterprise provides updates to the current and emerging capabilities, best practices, and performance levels of security operations as learned from the assessment of organizations around the globe.

(more available)
Added: October 20, 2018
image from 2016 State of Security Operations

2016 State of Security Operations

In the State of Security Operations Maturity report, Hewlett Packard Enterprise provides updates to the capabilities, lessons learned, and performance levels of security operations based upon maturity assessments performed on a worldwide organizations.

(more available)
Added: October 19, 2018
image from Bridging The IoT Perception Gap:Information Vs. Operational Technology

Bridging The IoT Perception Gap:Information Vs. Operational Technology

This report is based on a survey that was conducted to observe the differing views and opinions of IT and OT teams.

(more available)
Added: October 18, 2018
image from Cyber Risk Report 2016

Cyber Risk Report 2016

From the report, “In this report we provide a broad view of the 2015 threat landscape, ranging from industry-wide data to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.”

(more available)
Added: October 18, 2018
image from Cyber Risk Report 2015

Cyber Risk Report 2015

The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

(more available)
Added: October 17, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)