Security incidents threatened everyone this year but prompted many organizations to adopt incident response plans. More online services implemented two-factor authentication in 2014. Heartbleed, Bash, Shellshock, and mobile devices are emerging threats that could develop into future threats. The need for the adaptive perimeter is even greater in 2015 as the Internet of Things and a dynamic BYOD workforce drive the need. We need to change the way we assess risks in fundamental technology components with better software threat models, says John Defterios.”]
Source: https://www.darkreading.com/attacks-breaches/a-2014-lookback-predictions-vs-reality

