Cybercrime

2016 Cyberthreat Defense Report

Provided by Citrix

Category Cybercrime

Type Analyst Report

Length 36

Publish Date February 14 2016

Date posted May 04 2016

Overview

The first two installments of the Cyberthreat Defense Report began the process of looking beyond major breaches and the never-ending evolution of cyberthreats to
better understand what IT security teams are doing to defend against them. Highlights of what we learned from those reports include:

  • One in four security professionals doubts their organization has invested adequately in cyberthreat defenses (2014).
  • Mobile devices and social media applications are IT security’s “weakest links” (2015).
  • More than two-thirds of organizations are looking to replace or augment their endpoint security tools (2015).

Blogs

phil-muncaster

China Rising

The South China Sea: A new hacking hotspot

Phil Muncaster reports on China and beyond

mark-chillingworth

CIO Watch

Losing CIOs to startups could be costly

Mark Chillingworth on IT leadership

jon-collins

Thinking Different

Can technology save a post-Brexit Britain?

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?