Information security startups are finding new ways to inspect files for suspicious activity to detect malware. Firms are developing new technologies to encrypt machine-to-machine communication for critical infrastructure protection. Mobile protections are addressing the security of text messages, making them self-destruct after a time period or securing VoIP calls from eavesdroppers.
The battle against cybercrime is focusing more on ways to make it costlier to conduct attacks. New defensive mechanisms are isolating applications using virtualization technology. They're also going deeper, using hardware-based security to get underneath the operating system to increase visibility over the processes that run the entire system.