But after 11 years it continues to mature and provide a reasonable framework for securing IT systems.
Gen. Keith Alexander insists that the NSA needs public and industry support to do its job, but his lack of transparency makes it hard to keep the faith.
Security priorities are being set for the coming fiscal year, but budget irresponsibility could make achieving them difficult.
The encrypted communications provider is teaming with the Human Rights Foundation to enable secure links for activists, dissidents and other groups at risk of government snooping.
The latest revelations from the Snowden files confirm what many have suspected for more than 35 years: The NSA knows it is easier to break a code if someone gives you the keys.
The attacks being used by pro-Assad hacktivists are not new, but they demonstrate the ability of bad guys to exploit the Internet's ecosystem.
DHS' Continuous Diagnostic and Mitigation program is the latest step in a trend toward holistic security that puts it into the hands of experts.
The vulnerability, an IPv6 version of a flaw that was fixed more than a decade ago, is one more reason to be aware of the IPv6 traffic agency networks.
Despite a consensus that information sharing is critical to cybersecurity, organizations still hold onto their information, allowing serious threats to flourish for years after they become known.
Mobile computing seems to be the new frontier of cybersecurity, but identifying new trends at the Black Hat Briefings is more difficult as the conference grows and becomes more inclusive.