As cybersecurity experts across the digital economy struggle to keep pace with ever-evolving threats, advancements in mobile security and privacy offer a vision into how security can be done properly while enabling continuous improvement. While new threats to mobile devices continue to arise, the protections in place are generally working better than in other areas of cybersecurity. It is imperative to understand why this is, how it came to be, and to ensure that policymakers do not make decisions that could weaken these protections.

Read Next

Who Controls Whether Your AI Agents Can Be Found? Takeaways from RSA Roundtable on the AI Agent Discovery Gap

Agentic AI emerged as a defining theme at RSAC 2026 and among the many questions raised was how will AI agents discover one another and who determines whether they can be discovered at all?

Cybersecurity, Better Identity Coalitions Submit Comments to NIST on Agentic AI

The Cybersecurity Coalition and the Better Identity Coalition submitted comments to NIST on agentic AI.

CISA Shifts Federal Cyber Security Landscape with Sweeping Mandate to Replace End-Of-Life Network Devices

CISA issued a compulsory directive to all federal agencies targeting boundary network devices that are “end-of-service."