Mobile malware is not new, but a new tool in the cyber crime underground could ultimately pave the way for hackers to leverage malware in large mobile botnets.
Concerns persist that new generic Top Level Domains being approved for the Internet could conflict with internal naming schemes, disrupting networks with naming collisions.
Concerns about privacy, spying and leaks are creating demand for products and services that encrypt and protect mobile communications, and smart phones have the processing power to handle it.
The NSA, embarrassed by leaks about its covert activities, installs a two-man rule for access to sensitive information. There are other ways to shore up systems, too, though none are perfect.
Growth of BYOD encryption company Silent Circle, already robust, has skyrocketed in the wake of revelations of NSA surveillance, and government is the biggest customer.
New, layered attacks call for intelligence-based security, and cloud computing offers a way to gather and analyze big data to spot malicious activity.
Reform would focus on a risk-based approach using automated tools for continuous monitoring that agencies already are adopting. But will they be graded on security or paperwork?
A study of meters used to measure strength of passwords created on websites suggests you can only push users so far before they stop trying.
When considering retaliation against cyber criminals, make sure the rule of law trumps the immediate gratification of doing unto others.
As part of efforts to secure government infrastructure, an interagency working group is developing plans for cybersecurity requirements in federal acquisitions, which would benefit from a consistent terminology.