Description: The first two installments of the Cyberthreat Defense Report began the process of looking beyond major breaches and the never-ending evolution of cyberthreats to better understand what IT security teams are doing to defend against them. Highlights of what we learned from those reports include:
One in four security professionals doubts their organization has invested adequately in cyberthreat defenses (2014).
Mobile devices and social media applications are IT security’s “weakest links” (2015).
More than two-thirds of organizations are looking to replace or augment their endpoint security tools (2015).