Security teams must spend 2015 preparing for a world of wearable, portable, smart tech that is as promiscuous in its data sharing as it is varied in its form factor.
It's easy to get hung up on discussions around chip-and-pin, malware and network segmentation, and in the process lose sight of the broader trends that underlie many breaches.
IT trends - cloud, social networking and BYOD - are making the practice of security management complex, and are forcing organizations to shift to a risk-management perspective.