Blog Posts The Malware Maelstrom Malware-as-a-Service (MaaS) operations continue to pose significant security and operational risks to organizations of all…Don SortorOctober 17, 2023
Blog Posts Calculating the Cost of Business Disruptions Organizations spend billions on software and services related to migrations, upgrades, and new technology deployments.…Don SortorOctober 10, 2023
Blog Posts Eavesdropping and Espionage Earlier this month it was reported that Norwegian intelligence officials arrested a Malaysian student on…Don SortorSeptember 19, 2023
Blog Posts Space, The Next Hacking Frontier The United States is by far the largest investor in space innovation including satellites, communications…Don SortorSeptember 14, 2023
Blog Posts Preparing for the Next Wave of Chinese Espionage Last week in London the heads of domestic security services from the United Stated and…Don SortorSeptember 12, 2023
Blog Posts If China Can Hack Microsoft, How About You? Last month Microsoft disclosed that unclassified email systems of several State Department officials were compromised,…Don SortorSeptember 7, 2023
Media Coverage Mitigating the Alarming Extent of Publicly Accessible Personal Data through Global Integrity’s QTel In this Ontic podcast interview with Fred Burton, our CEO Bill Marlow discusses the hard truth about how the…William PennAugust 31, 2023
Blog Posts Brazilian Escort Service Hacked – Another Cautionary Tale It was reported last week that Brazil’s top escort service was hacked, exposing the privacy…Don SortorAugust 29, 2023
Blog Posts Even the US Military is Vulnerable to Chinese Malware Another day, another malware discovery. This time within the US military. According to a recent…Don SortorAugust 3, 2023
Blog Posts Reality Check on Mobile Apps, Devices, and the Lack of Privacy and Security Personally, or professionally, the use of mobile apps and social networks can reveal a lot…Don SortorJuly 25, 2023