In the first of two installments, the Cyberthreat Defense Report began looking at the causes of major breaches to better understand what IT security teams are doing to defend against them. This report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions such as types of cyberthreats that pose risks and the strategic value individual security technologies provide.
Phil Muncaster reports on China and beyond
Jon Collins’ in-depth look at tech and society
Kathryn Cave looks at the big trends in tech