Download We are in the midst of a golden age of hacking. The information security threat landscape is changing rapidly, and security organizations are struggling to keep up with the changing nature, complexity, and scale of attacks. This dynamic landscape will not stabilize. As security managers struggle to keep up with this changing landscape and develop capabilities for handling new threats, the attacks of 2014 taught us that the threat landscape is rapidly mutating as attackers find ever more devious ways of bypassing security controls. This report will help security and risk (S&R) leaders educate business executives about these threats and build the business case for investments in security architecture and operations necessary to defend against them.