Concerns about privacy, spying and leaks are creating demand for products and services that encrypt and protect mobile communications, and smart phones have the processing power to handle it.
The NSA, embarrassed by leaks about its covert activities, installs a two-man rule for access to sensitive information. There are other ways to shore up systems, too, though none are perfect.
Growth of BYOD encryption company Silent Circle, already robust, has skyrocketed in the wake of revelations of NSA surveillance, and government is the biggest customer.
New, layered attacks call for intelligence-based security, and cloud computing offers a way to gather and analyze big data to spot malicious activity.
Reform would focus on a risk-based approach using automated tools for continuous monitoring that agencies already are adopting. But will they be graded on security or paperwork?
A study of meters used to measure strength of passwords created on websites suggests you can only push users so far before they stop trying.
When considering retaliation against cyber criminals, make sure the rule of law trumps the immediate gratification of doing unto others.
As part of efforts to secure government infrastructure, an interagency working group is developing plans for cybersecurity requirements in federal acquisitions, which would benefit from a consistent terminology.
Government and industry experts think biometric authentication is poised to take off, but fingerprints, iris scans and voice recognition are not foolproof forms of ID.
Social media outlets were never intended as mission-critical applications; recent events show why.