Share 

Available Now:

2014 Data Breach Investigations Report

Gain fresh insight into cyber espionage and denial-of-service attacks in the 2014 Data Breach Investigations Report (DBIR).

MD5 | SHA-1 MD5 and SHA-1 are cryptographic hash functions used to authenticate data integrity.
MD5, a Message-Digest Algorithm, produces a 128-bit hash value commonly used to check files' integrity; it has been utilized in a wide variety of security applications.
SHA-1, a Secure Hash Algorithm, was designed by the U.S. National Security Agency; its 160-bit message digest is employed in several widely used applications and protocols.

Read an excerpt from the 2014 Data Breach Investigations Report.

“We have more incidents, more sources, and more variation than ever before—and trying to approach tens of thousands of incidents using the same techniques simply won’t cut it. Not only would the dominant incident characteristics drown out the subtleties of the less frequent varieties, but we cannot continue to study those characteristics as though they occur in isolation. In order to expose latent patterns in the data, we applied a statistical clustering technique. We identified nine patterns that together describe 92% of the confirmed data breaches we collected in 2013. We find it simply astounding that nine out of ten of all breaches observed by 50 global organizations over a full year can be described by nine distinct patterns.”

92% of security incidents we analyzed are covered by just nine attack patterns. #DBIR makes security simple.

Share This

Get a global view of security. The Verizon 2014 DBIR represents breaches from 95 countries.

Share This

Contact a sales representative.

Discover security solutions that can help protect your organization.

Understand attack methods.

Access security reports, industry-specific insights, and historical data breach analyses.