Despite a consensus that information sharing is critical to cybersecurity, organizations still hold onto their information, allowing serious threats to flourish for years after they become known.
Mobile computing seems to be the new frontier of cybersecurity, but identifying new trends at the Black Hat Briefings is more difficult as the conference grows and becomes more inclusive.
The annual Black Hat USA security conference is not exactly hostile, but you’ll run into a lot of people who pride themselves on their hacking skills.
Mobile malware is not new, but a new tool in the cyber crime underground could ultimately pave the way for hackers to leverage malware in large mobile botnets.
Concerns persist that new generic Top Level Domains being approved for the Internet could conflict with internal naming schemes, disrupting networks with naming collisions.
Concerns about privacy, spying and leaks are creating demand for products and services that encrypt and protect mobile communications, and smart phones have the processing power to handle it.
The NSA, embarrassed by leaks about its covert activities, installs a two-man rule for access to sensitive information. There are other ways to shore up systems, too, though none are perfect.
Growth of BYOD encryption company Silent Circle, already robust, has skyrocketed in the wake of revelations of NSA surveillance, and government is the biggest customer.
New, layered attacks call for intelligence-based security, and cloud computing offers a way to gather and analyze big data to spot malicious activity.
Reform would focus on a risk-based approach using automated tools for continuous monitoring that agencies already are adopting. But will they be graded on security or paperwork?