Blog Posts Calculating the Cost of Business Disruptions Organizations spend billions on software and services related to migrations, upgrades, and new technology deployments.…Don SortorOctober 10, 2023
Blog Posts Can You Broadcast Secure Messages? Yesterday the federal government conducted a nationwide test of its Wireless Emergency Alerts (WEA) system.…Don SortorOctober 5, 2023
Blog Posts What is Your Privacy Worth? It is a simple question, but most cannot put a value on it. When you…Don SortorOctober 3, 2023
Blog Posts Tracking Your Phone There seems to be no shortage of corporate espionage incidents as well as foreign and…Don SortorSeptember 28, 2023
Blog Posts False Sense of Secure Communications Apps Telegram, WhatsApp, SIGNAL, and WickR are widely used by billions of people to facilitate phone…Don SortorSeptember 26, 2023
Blog Posts Creepy Car Confessions – Your Car is Listening Last month we discussed how smart cars collect a ton of data on you, primarily…Don SortorSeptember 21, 2023
Blog Posts Eavesdropping and Espionage Earlier this month it was reported that Norwegian intelligence officials arrested a Malaysian student on…Don SortorSeptember 19, 2023
Blog Posts Space, The Next Hacking Frontier The United States is by far the largest investor in space innovation including satellites, communications…Don SortorSeptember 14, 2023
Blog Posts Preparing for the Next Wave of Chinese Espionage Last week in London the heads of domestic security services from the United Stated and…Don SortorSeptember 12, 2023
Blog Posts If China Can Hack Microsoft, How About You? Last month Microsoft disclosed that unclassified email systems of several State Department officials were compromised,…Don SortorSeptember 7, 2023