Blog Posts Secure Communications Strategy and Checklist to Support Operations in High-Risk and Conflict Zones Many organizations are facing a new reality that areas they operate in are now in…Don SortorNovember 2, 2023
Blog Posts Operating in Conflict Zones – How Media, NGOs, and Humanitarian Organizations Can Protect Their People and Communications High risk conflict zones in Europe, the Middle East, and other parts of the globe…Don SortorOctober 24, 2023
Blog Posts LinkedIn, Spies and Espionage British officials have uncovered a ruse alleging Chinese spies are using LinkedIn to target and…Don SortorOctober 19, 2023
Blog Posts The Malware Maelstrom Malware-as-a-Service (MaaS) operations continue to pose significant security and operational risks to organizations of all…Don SortorOctober 17, 2023
Blog Posts Maintaining Secure Communications in High-Risk Environments As organizations deploy teams in high-risk environments around the world, the need for secure communications…Don SortorOctober 13, 2023
Blog Posts Calculating the Cost of Business Disruptions Organizations spend billions on software and services related to migrations, upgrades, and new technology deployments.…Don SortorOctober 10, 2023
Blog Posts Can You Broadcast Secure Messages? Yesterday the federal government conducted a nationwide test of its Wireless Emergency Alerts (WEA) system.…Don SortorOctober 5, 2023
Blog Posts What is Your Privacy Worth? It is a simple question, but most cannot put a value on it. When you…Don SortorOctober 3, 2023
Blog Posts Tracking Your Phone There seems to be no shortage of corporate espionage incidents as well as foreign and…Don SortorSeptember 28, 2023
Blog Posts False Sense of Secure Communications Apps Telegram, WhatsApp, SIGNAL, and WickR are widely used by billions of people to facilitate phone…Don SortorSeptember 26, 2023