Blog Posts Mergers, Acquisitions and the Need for Secure Communications Data clean room technology is widely used to support merger and acquisition activities, such as…Don SortorAugust 17, 2023
Blog Posts Underestimating Insider Threats Last month two US Navy sailors were charged with spying for China. Both were charged…Don SortorAugust 15, 2023
Blog Posts Smart Cars Driving New Data Privacy Concerns If you are driving a vehicle that requires a key to engage the ignition, congratulations,…Don SortorAugust 10, 2023
Blog Posts FBI’s Access to Spying Tools Questions American Privacy Last week’s article in the Wall Street Journal offers a glimpse of the type of…Don SortorAugust 8, 2023
Blog Posts Even the US Military is Vulnerable to Chinese Malware Another day, another malware discovery. This time within the US military. According to a recent…Don SortorAugust 3, 2023
Blog Posts Reality Check on Mobile Apps, Devices, and the Lack of Privacy and Security Personally, or professionally, the use of mobile apps and social networks can reveal a lot…Don SortorJuly 25, 2023
Blog Posts Apple Beefs Up Security – Is It Enough? Apple computer announced that it is now going to provide end-to-end encryption for the items…Don SortorDecember 9, 2022
Blog Posts Healthcare Group Notifies Millions of Patients After Hack Another day, another cyberattack. In March, Shields Health Care Group, Inc. discovered suspicious activity resulting…Don SortorSeptember 13, 2022
Blog Posts Banks Nearing $1 Billion Settlement Over Use of Banned Messaging Apps Yesterday's Wall Street Journal ran a story about how some of the biggest banks are…Don SortorAugust 20, 2022
Blog Posts Ukraine War Steps Up Cyberattacks According to a Wall Street Journal article, Russian intelligence agencies have increased the pace of…Don SortorJuly 15, 2022