The Business of Hacking

ハッキングというビジネス

The Business of Hacking -why

ハッキングというビジネス

HPEのハッキングビジネスレポートはハッキングのSWOT分析で、ハッカーやハッカーのビジネスを攻撃と防止また、不正に利用するのに使用できる強みと弱みを明らかにしています。

Understand hackers’ businesses to protect your own

ハッカーは現在、組織化されたビジネスへと発展しています。 ハッカーのモチベーションは利益であり、その戦略は最少のリスクで最大の投資収益率(ROI)を獲得することです。 ハッカーがどのように運営しているかを理解し、ライバルとして扱うことでハッカーのビジネスを阻止し御社のビジネスを守ることができます。

ハッキングというビジネスについて

エキスパートのコメントをお聞きください。

(2分48秒)

The Business of Hacking

Hackers operate in organized businesses—with their own risks and profits. Understand the business of hacking. Learn how they’re organized and how they make their money, so you can plan your strategy to beat them.

(PDF 5393KB)

Most effective security strategies

Learn which cyber defenses are most effective. IDC analysts share their experiences working with organizations across the industry as each has fought back to disrupt the business of hacking and make their companies safer.

Get proactive—disrupt the business of hacking

A look back on the Timeline of Disruption

Disrupt hackers’ businesses. Drive their costs up and profits down by deploying cyber defenses that force them to change their attacks. This paper provides a history of cybercrime and shows how it has evolved in response to the defenses we mount.

(PDF 449KB)

A Brief History of Cyber crime

The timeline of disruption—the measures we take to defeat hacker attacks—follows the timeline of computing itself. View the infographic to see how cyber defenses have evolved to keep hackers looking for new ways to access and steal data.

(PDF 62 KB)

Understand your newest competitor

Do hackers really have businesses like yours? Yes they do—with the same profit motives and business functions. Watch the video to learn how hackers operate and why treating them like competitors lets you disrupt their businesses to protect yours.

(Video 14:42 minutes)

Resources

Analyst report

UBM: How to disrupt the business of hacking

(PDF 2523KB)

Online assessment

How Mature Are Your Security Operations?

Online assessment

Take the Software Security Assurance Self-assessment