The first two installments of the Cyberthreat Defense Report began the process of looking beyond major breaches and the never-ending evolution of cyberthreats to
better understand what IT security teams are doing to defend against them. Highlights of what we learned from those reports include:
- One in four security professionals doubts their organization has invested adequately in cyberthreat defenses (2014).
- Mobile devices and social media applications are IT security’s “weakest links” (2015).
- More than two-thirds of organizations are looking to replace or augment their endpoint security tools (2015).