As cybersecurity experts across the digital economy struggle to keep pace with ever-evolving threats, advancements in mobile security and privacy offer a vision into how security can be done properly while enabling continuous improvement. While new threats to mobile devices continue to arise, the protections in place are generally working better than in other areas of cybersecurity. It is imperative to understand why this is, how it came to be, and to ensure that policymakers do not make decisions that could weaken these protections.

Read Next

Risks Associated with IT Monoculture Needs Further Examination

IT concentration risk is a relatively new term but due to recent cyberattacks it has been front and center. To examine the issue the Center conducted an exercise to look at the threats of IT concentration risk and offer recommendations.

Addressing Concentration Risk in Federal IT

The Center conducted a multi-stakeholder tabletop exercise in April to explore a form of concentration risk where a single software, configuration, service, or hardware becomes dominant in an ecosystem.

Breaking the endless loop and reframing the encryption debate

Encryption advocates and law enforcement are stuck in an endless loop when it comes to debating encryption. It's time for industry and law enforcement to sit down, discuss challenges, listen to one another, and work together to create solutions.