UPDATED 06:56 EST / FEBRUARY 04 2014

HP outlines new enterprise threat landscape in annual report

Despite increasing security awareness and a heightened focus on information privacy, enterprises remain highly vulnerable to all manner of cyber attacks, Hewlett-Packard concluded in the latest installment of its annual Cyber Risk Report. Published on Monday, the paper lists configuration issues and and widespread use of antiquated technologies among the main threats to large organizations.

“Adversaries today are more adept than ever and are collaborating more effectively to take advantage of vulnerabilities across an ever-expanding attack surface,” commented Jacob West the CTO of Enterprise Security Products at HP. “The industry must band together to proactively share security intelligence and tactics in order to disrupt malicious activities driven by the growing underground marketplace.”

HP saw the number of published exploits fall six percent in 2013 compared with the prior 12 months, while vulnerabilities labelled “high-severity” decreased nine percent for the fourth consecutive year. The company attributes this decline not to advancements in cybersecurity, but rather a “surge” in black market demand.

These figures are made even more notable by the fact that nearly 80 percent of applications reviewed in the study contained vulnerabilities stemming from misconfiguration. Additionally, the company found that 46 percent of Android and iOS apps either don’t encrypt sensitive information stored locally, rely on weak algorithms to do so, or fail to properly implement data protection.

On the browser front, HP reported that Internet Explorer accounted for more than 50 percent of vulnerabilities discovered as part of its Zero-Day Initiative. Equally notable is that sandbox bypass vulnerabilities were the most prevalent and damaging for Java users, especially when hackers used multiple known vulnerabilities in combined attacks.

The company recommends that organizations keep close track of the threat landscape, particularly vulnerabilities in hybrid mobile development platforms, and strive for a “combination of the right people, processes and technology” to mitigate security risks.


Since you’re here …

… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.