As cybersecurity experts across the digital economy struggle to keep pace with ever-evolving threats, advancements in mobile security and privacy offer a vision into how security can be done properly while enabling continuous improvement. While new threats to mobile devices continue to arise, the protections in place are generally working better than in other areas of cybersecurity. It is imperative to understand why this is, how it came to be, and to ensure that policymakers do not make decisions that could weaken these protections.

Read Next

FedRAMP Finalizes Emerging Technology Prioritization Framework

The GSA FedRAMP PMO released the final version of its Emerging Technology Prioritization Framework that seeks to expedite FedRAMP authorizations for select cloud offerings with emerging technology features, such as generative AI.

PQC: Lead the Way or Fall Behind

NIST has selected the Post-Quantum Cryptography algorithms and now is the time for organizations to decide to lead or get left behind. Establishing a foundation of trust and protecting information and infrastructure with these standards is crucial.

Risks Associated with IT Monoculture Needs Further Examination

IT concentration risk is a relatively new term but due to recent cyberattacks it has been front and center. To examine the issue the Center conducted an exercise to look at the threats of IT concentration risk and offer recommendations.