Blog Posts Maintaining Secure Communications in High-Risk Environments As organizations deploy teams in high-risk environments around the world, the need for secure communications…Don SortorOctober 13, 2023
Blog Posts Calculating the Cost of Business Disruptions Organizations spend billions on software and services related to migrations, upgrades, and new technology deployments.…Don SortorOctober 10, 2023
Blog Posts Can You Broadcast Secure Messages? Yesterday the federal government conducted a nationwide test of its Wireless Emergency Alerts (WEA) system.…Don SortorOctober 5, 2023
Blog Posts What is Your Privacy Worth? It is a simple question, but most cannot put a value on it. When you…Don SortorOctober 3, 2023
Blog Posts Tracking Your Phone There seems to be no shortage of corporate espionage incidents as well as foreign and…Don SortorSeptember 28, 2023
Blog Posts False Sense of Secure Communications Apps Telegram, WhatsApp, SIGNAL, and WickR are widely used by billions of people to facilitate phone…Don SortorSeptember 26, 2023
Blog Posts Creepy Car Confessions – Your Car is Listening Last month we discussed how smart cars collect a ton of data on you, primarily…Don SortorSeptember 21, 2023
Blog Posts Eavesdropping and Espionage Earlier this month it was reported that Norwegian intelligence officials arrested a Malaysian student on…Don SortorSeptember 19, 2023
Blog Posts Space, The Next Hacking Frontier The United States is by far the largest investor in space innovation including satellites, communications…Don SortorSeptember 14, 2023
Blog Posts Preparing for the Next Wave of Chinese Espionage Last week in London the heads of domestic security services from the United Stated and…Don SortorSeptember 12, 2023