In the first of two installments, the Cyberthreat Defense Report began looking at the causes of major breaches to better understand what IT security teams are doing to defend against them. This report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions such as types of cyberthreats that pose risks and the strategic value individual security technologies provide.
Kathryn Cave looks at the big trends in tech
Rupert Goodwins’ unique angle on tech change
Phil Muncaster reports on China and beyond