-
-
Understanding the threats can help you manage risk effectively.
The threats are real, the attackers motivated. But something stands between them and your organization's data: you and your security teams, with the insight, perspective, and tools to take action. You'll find that all right here.
Download the Report Read the Executive Summary Contact us
-
Introduction
A report built on a substantial data set from many sources.
-
Summary of Findings
Survey actors, motivators, attack paths and targets.
-
Results and Analysis
Take a deep dive into this year’s data set.
-
Incident Classification Patterns & Subsets
Nine basic incident patterns which share characteristics.
-
Data Breaches, Extended Version
Explore vulns before breaches – and actions after.
-
Industry Analysis
Understand attack vectors and vulns by industry.
-
Wrap Up
Review 2018's noteworthy security events by month.
-
Methodology
See how we collect, analyze, and present data.
Explore our security report archive.
-
2018 Data Breach Investigations Report
Read the 2018 reportWithin the 53,000+ incidents and 2,200-odd breaches you’ll find real takeaways on what not to do, or at the very least, what to watch for.
-
2017 Data Breach Investigations Report
Read the 2017 reportUnderstanding the threats you face is the key to effective cybersecurity. The 2017 DBIR revealed the biggest threats in your sector and what you can do to mitigate them.
-
2016 Data Breach Investigations Report
Read the 2016 reportWhat were the biggest threats in the 2016 report? The nine incident classification patterns we identified in 2014 reigned supreme. Get our advice on how to mitigate the risks.