Cisco’s 2010 Midyear Security Report
As more organizations transition to borderless enterprises, criminals are quickly discovering new tactics for breaching network safeguards. Businesses are weighing the benefits of embracing mobility, video, and collaborative applications (such as social networking and peer-to-peer technologies). At the same time, criminals are using the same innovations not only to commit crime, but also to refine their areas of expertise.
The Cisco 2010 Midyear Security Report examines the major forces of change reshaping the global security landscape. These changes demand that organizations rethink their approaches to enterprise security. Current shifts — from the virtualization of operations to collaboration and social networking — provide new opportunities for criminals to infiltrate networks and steal high-value business data.