KuppingerCole Report
Leadership Brief
Top Cyber Threats
The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber threats—and shows how to overcome or manage them.
Content of Figures
1 Executive Summary
Every three years, the Open Web Application Security Project (OWASP) Foundation publishes its "OWASP Top 10" document, which is widely read across a b ...
Login Free 30-day Select Access Get full Access2 Analysis
Social Engineering
The social hacking of people has different characteristics. A person can be compromised by manipulation of:
- purchase
- open ...
The OWASP Top 10 also cover Insecure APIs and Data Breaches, but Malware, Social Engineering and Insider Threat are not included because of the focus ...
Login Free 30-day Select Access Get full Access3 Recommendations
The distributed applications with the As-a-Service concept and hybrid infrastructures offer new attack points, but attack methods themselves have chan ...
Login Free 30-day Select Access Get full Access