Dmitri Alperovitch, co-founder of the cybersecurity startup CrowdStrike, says his company is building stockpiles of intelligence about potential hacking groups. Keith Bedford/Reuters/Landov hide caption

itoggle caption Keith Bedford/Reuters/Landov

Anthem says 80 million company records were accessed in what may be one of the largest health care data breaches to date. Aaron P. Bernstein/Getty Images hide caption

itoggle caption Aaron P. Bernstein/Getty Images

President Obama speaks Tuesday at the National Cybersecurity and Communications Integration Center in Arlington, Va. Pool/Getty Images hide caption

itoggle caption Pool/Getty Images

The president spoke about one measure aimed at the data collected in schools, through increasingly popular educational software. "Michelle and I are like parents everywhere," Obama said. "We want to be sure our children are being smart and safe online." Carolyn Kaster/AP hide caption

itoggle caption Carolyn Kaster/AP

Using Tor, or The Onion Router, enables users to hide their online activities. Advocates say the network protects the privacy of activists. But prosecutors say it's used extensively by criminals — and is making it harder for law enforcement to do its job. Daniel Acker/Bloomberg via Getty Images hide caption

itoggle caption Daniel Acker/Bloomberg via Getty Images

Amid much speculation by private security analysts, the FBI stood by its claim this week that North Korea was responsible for the hack against Sony Pictures. Damian Dovarganes/AP hide caption

itoggle caption Damian Dovarganes/AP

The toxic ingredients of a cyberattack like the one North Korea is accused of unleashing on Sony Pictures are available in underground markets. Damian Dovarganes/AP hide caption

itoggle caption Damian Dovarganes/AP

Participants in an ethical hacking contest at a Swiss security conference in Geneva in March. So-called bug bounty programs are becoming very popular in Silicon Valley's high-tech sector. Salvatore Di Nolfi/EPA/Landov hide caption

itoggle caption Salvatore Di Nolfi/EPA/Landov

After Grant Hernandez, an undergraduate security researcher at the University of Central Florida, hacked Nest, he programmed it to riff off a favorite line from the movie 2001: A Space Odyssey. Aarti Shahani/NPR hide caption

itoggle caption Aarti Shahani/NPR

Cybersecurity researcher Ruben Santamarta says he has figured out how to hack the satellite communications equipment on passenger jets through their Wi-Fi and in-flight entertainment systems. Andrea Comas/Reuters/Landov hide caption

itoggle caption Andrea Comas/Reuters/Landov

The building housing China's Unit 61398, a division of the army linked to hacking operations, is seen in Shanghai last year. The U.S. says the group worked to steal trade secrets from American companies. AP hide caption

itoggle caption AP

When it comes to Internet security, many experts agree outsourcing can create added risks, even if they disagree on the merits of outsourcing in the first place. Igor Stevanovic/iStockphoto hide caption

itoggle caption Igor Stevanovic/iStockphoto

This 12-story building houses a Chinese military unit allegedly behind dozens of cyberattacks on U.S. and other Western companies. It's in a modern, if bland, part of Shanghai. Peter Parks/AFP/Getty Images hide caption

itoggle caption Peter Parks/AFP/Getty Images