Monitored cyber attacks in the United States in 2013
IBM Security Services 2014 Cyber Security Intelligence Index, April 2014
Quantifying the data breach epidemic
Data breaches are among the most common and costly security failures in organizations of any size. In fact, studies show that companies are attacked an average of 16,856 times a year, and that many of those attacks result in a quantifiable data breach. And with today's data moving freely between corporate networks, mobile devices, and the cloud, data breach statistics show this disturbing trend is rapidly accelerating.
Building a business case for security investment begins with quantifying the threat. Data breach statistics abound on the web. But not all data breach statistics are reported, and some victims aren't even aware they've been compromised. IBM conducts its own research – in part collected from the thousands of clients whose networks we monitor – and we share our data breach statistics in the reports you'll find on this page. And we can assure you — the data breach threat is very real, and very costly. To learn more about today’s critical threats and how companies are responding, download one of our comprehensive data breach statistics reports.
Understand the threat landscape
Find out how cyber security events break down by country and find out who’s behind the majority of attacks.
Evaluate the risk
Understand the costs associated with an IT security breach and the impact on reputation and brand image
Sizing the security intelligence challenge.
How do you filter out the harmful incidents from the millions of events?
Seeing the financial consequences of a security breach
How do the costs of a breach add up across six categories?
2014 Cost of Data Breach Study
Industry-leading benchmarks from Ponemon Institute, sponsored by IBM.
Gartner Evaluates Global Managed Security Service Providers
IBM positioned among leaders in Gartner Magic Quadrant
Selecting a Managed Security Service Provider
The 10 most important criteria
IBM Threat Protection System
Prevention is possible. Discover how the latest advances in Threat Protection can keep your organization safe.
A new standard for security leaders
Insights from the 2013 IBM Chief Information Security Officer Assessment
4 steps for preventing data breaches
A guide for how to respond to—and recover from—sophisticated security attacks.
2014 Cyber Security Intelligence Index
Who are the targets? What are the trends?
Q2 2014 X-Force report
Underestimating your security tactics? Attackers won't!