Blog Posts No Fly Zone –Your Travel Apps Are Tracking You Travel apps offer convenience, deals, and suggestions on everything related to, well... travel. From booking…Don SortorSeptember 5, 2023
Blog Posts Spies Among (and Beyond) Us In the world of international espionage, where nations deploy spies to target and infiltrate other…Don SortorAugust 31, 2023
Blog Posts Brazilian Escort Service Hacked – Another Cautionary Tale It was reported last week that Brazil’s top escort service was hacked, exposing the privacy…Don SortorAugust 29, 2023
Blog Posts What’s Up with WhatsApp? With billions of active monthly users, the WhatsApp platform is a prime target for hackers,…Don SortorAugust 24, 2023
Blog Posts Are Your Communications Secure? Are You Sure? Organizations today either underestimate their technology vulnerabilities, assuming bad actors are uninterested in what is…Don SortorAugust 22, 2023
Blog Posts Mergers, Acquisitions and the Need for Secure Communications Data clean room technology is widely used to support merger and acquisition activities, such as…Don SortorAugust 17, 2023
Blog Posts Underestimating Insider Threats Last month two US Navy sailors were charged with spying for China. Both were charged…Don SortorAugust 15, 2023
Blog Posts Smart Cars Driving New Data Privacy Concerns If you are driving a vehicle that requires a key to engage the ignition, congratulations,…Don SortorAugust 10, 2023
Blog Posts FBI’s Access to Spying Tools Questions American Privacy Last week’s article in the Wall Street Journal offers a glimpse of the type of…Don SortorAugust 8, 2023
Blog Posts Even the US Military is Vulnerable to Chinese Malware Another day, another malware discovery. This time within the US military. According to a recent…Don SortorAugust 3, 2023